Cloud computing

Cloud computing concept is usually regarded as the Internet. Because the Internet itself is described as a cloud (Cloud) great (usually in the network scheme, denoted as the Internet cloud) that contains a set of interconnected computers. Cloud computing comes as an evolution refers to the convergence of technology and more dynamic applications. Where there is a major change has implications that touch almost every aspect of computing. For the end user, Cloud computing provides a new means to improve service or allocate computing resources more quickly, Based on business needs.

Gambar

Cloud computing isa general overview

Benefits of Cloud Computing
Cloud Computing has many benefits, including:
a. Reduce the cost of technology.
Because Cloud Computing is paid incrementally, so you can save money data storage.
b. Increasing the capacity of
Data storage in the cloud computing outweigh the personal computer.
c. automatic updates
In Cloud Computing we do not have to worry about servers and software updates, because all that has been done automatically.
d. better flexibility
cloud computing offers better flexibility than previous computer system.
d. mobility
Employees can access information wherever they are, they do not need to open the computer to get the information they need.

 

The working principle of cloud computing itself.
The working principle is similar to the Cloud Computer regular computer, only difference coupled with the presence of other computers. On a regular computer files of the software we use is stored in the hard disk or other storage media. But on computer clouds when viewed from the side of the user, the files of the software we use is in another computer.

In other words we are connected to multiple computers on a network server, but the data we store it was in the datacenter or dipusatnya, so that not only we can open the file that we save but computers or other users can open it and vice versa (Public). Also in a lot of infrastructure servers that we can use and we only pay as needed.

 

Characteristics ofCloud Computing
Fivecriteriathatmust be metbyasystemto be able toenterthefamilyinCloud Computing, namely:
1. The On DemandSelf Service
A customermay be possibleto directly”order” required resources, such asprocessortimeandstoragecapacityviaan electroniccontrol panelthatis provided. So noneed to interactwith thecustomer service personnelif necessaryincrease or decrease thecomputationalresourcesrequired.
2. BroadbandNetwork Access
Services availableare connectedviabroadband networks, especiallyforadequatelyaccessiblethrough the Internet, eitherusinga thin client, thickclientorother mediasuch assmartphones.

3. Resourcepooling
Cloud serviceprovider, providing servicesthroughresourcesthat are groupedinoneormultiple locationsof datacentersconsistingofa number ofserverswithmulti-tenant mechanism. Thismechanismenablesmulti-tenant computingtheamountof resourcesusedjointlybya number ofusers, where those resourceseither in the formof physicalor virtual,can beallocateddynamicallytothe needs ofusers/customerson demand. Thus, customersdo notneed to knowhowandwherethe demand forcomputingresourcesmet bythe serviceproviders. Importantly, everyrequestcan befulfilled. Thecomputingresourcesincludestorage, memory, processor, networkandvirtual machinetape.

4. Elastic(Rapid elasticity)
Computingcapacitythatcanbe providedrapidlyandelasticallysupplied, be itin the form ofaddition orreduction ofthe required capacity. Forcustomers themselves, withthis abilityas if theavailable capacityis notlimited in size, andcan be”purchased” at any timewith the numberonly.
5. MeasuredService
Availablecloudresourcesshouldbemanaged andoptimizedits use, witha measurement systemthatcanmeasure theusageofeachcomputingresourceuse(storage, memory, processor, bandwidth, user activity, etc.). Thus, the amountof resources usedcanbe measuredin a transparent mannerwhichwillbe the basisfor the user topay forthe cost of usingthe service.

 

There are several questions that are questions about data security

1 . Was our data will not be lost / affected by the virus ?

2 . Whether the data we will not plow or stolen someone else ?

3 . What if the data center disaster ?

The above questions we often hear when I talk about the cloud in the discussion forum for the implementation of the cloud , because it is like a new old thing why I say long because before we know Facebook and Yahoo Masangger we have used e – mail , using the mail delivery started we trust data / information we on the other hand , after we send the data we no longer have the data right where we want at the same miss our email provider . So actually by pressing the send button on a web mail means we have believed and trusted bahaw network we use is safe either from the virus or piracy of data , because the data is already there setandar security for the cloud .

The second questions whether the data we are not stolen , the company’s current cloud service provider in Indonesia can not be sure to follow the rules because the Indonesian government has not prepared a regulatory matter or new Cloud RPP Pite ( Draft Regulation Implementation Information and Electronic Transaction ) . so that the basis of ISO 27002 is an international benchmark that is standard on information security best practices that can also be used to assess the level of security in a Cloud Computing service providers .

What if data center disaster ? Currently the company ‘s cloud service providers will be placing a data center in a disaster -free areas , as well as the latest technology in the data center will bekup from various other data centers in massive numbers quite a lot , so the level of security would be guaranteed by the rules that bind and generally applicable

Before we implementations of cloud computing then we first need to understand some of the issues that are currently being developed and could serve as guidelines when if we will soon adopt cloud technology

    Risk Management and Compliance , organizations start adopting cloud should still be responsible for the management aspects of security , risk , and compliance with the rules applicable in the relevant industries . Risk management and obedience requires strong internal team and the transparency of the process of cloud service providers .
    Identity and Access Management , identity can be obtained through some cloud service providers , and should be interoperable between different organizations , different cloud providers , and based on robust processes .
    Integrity services , cloud -based services should be built with a foundation of strong security , and operational processes must also be integrated with the organization’s security management . Cloud service provider must follow the process that could be proven , well-defined , and clearly in integrating security and privacy to the services ranging from the earliest point , at any point in the cycle , until the final . Besides security management and auditing must be aligned between cloud providers and customers .
    Integrity Client , cloud services are used on the client side should pay attention to security aspects , obedience , and integrity on the client side . Integrity client can be improved by using a combination of best practices .
    Information protection , cloud services requires a reliable process to protect the information before , during , and after the transaction . Make the Data Classification to increase control over the data that is ready to be released into the cloud .

By following these guidelines the cloud technology is the solution to improve our performance , because with cloud technology we already do not depend on the place , and the computer will only be a tool to perform data access .

 

In a cloud computing system, there’s a significant workload shift. Local computers no longer have to do all the work load when running an application. Computer networks that make up the “cloud”-the one who will handle it instead. Kebutuh hardware and software on the user side will decrease. The only thing needed is a computer user can run a cloud computing system’s interface software, which can be as simple as a browser Website, and other networks to handle cloud.

Gambar

Image: Conceptof CloudComputing

Most likely youhave usedsomeform ofcloud computing. Ifyouhavee-mailaccountswithe-mail servicessuch asWeb-based Hotmail, Yahoo!Mail, orGmail, thenyoualreadyhavesomeexperiencewithcloud computing. In lieu ofrunning thee-mail programonyourcomputer, youlog into thee-mail accountremotely. Softwareanddata storagemediaforyouraccountdoes notexistonyourcomputer-itis inservice”cloud” computer.