Cloud computing has become a common way of enhancing functionality for both individuals and businesses. There are a number of cloud-based solutions that enable users to process and store data using remote servers. Some of these solutions are tailor-made for individual users while others support complex functions in large organizations. However, regardless of the increasingly growing demand for cloud-based solutions, security threat remains a major challenge (Furht & Escalante, 2012). Most of the existing solutions are vulnerable to cybercrime. This means that they do not offer a suitable solution for every company. Cloud-based solutions offer an ideal way of enhancing performance.
Cloud-based solutions for individuals are characterized by ease of use. They are meant to support basic functions such as storage of a low volume of data and communication between individuals. One of the most conspicuous, and perhaps commonly used, methods are social networking websites. In addition to the tremendous growth in the number of social networks, their use has increased significantly among individual users. Social networks provide an efficient platform that enables individuals to share information. Email is also a cloud-based solution that supports individual users. Emails provide a convenient means of communication between individual users. They are appropriate for use even in remote environments provided there is internet connectivity. Moreover, spreadsheet/document/ other hosting services also provide reliable cloud-based solutions for individuals (Mahmood, 2014). Google’s Picasa is a classic example that enables individual users to share photographs.
Increasingly, tech firms are providing cloud-based solutions that are also appealing to businesses. Most of these solutions are multifaceted and specifically made to support intricate services. One of the best examples is backup services. Services such as Mozy, Carbonite, and JungleDisk provide a convenient way for organizations to backing-up essential information at a relatively low cost. The Achilles heel of these solutions is that they are vulnerable to a security breach. Secondly, hosting services are also suitable for organizations. Google Docs and Spreadsheets, for instance, allow organizations to store and edit their documents online. This enables members of an organization to access and share information at different locations. In addition, emails are also commonly used cloud-based solutions for organizations. They provide an efficient means of communication. In fact, emails are swiftly replacing conventional memos as a preferred mode of communication.
Regardless of the manifold benefits provided by the aforementioned services, cloud computing is not a suitable solution for every organization. There are numerous privacy concerns that arise in organizations that use cloud computing services. One of these concerns is accountability. The use of cloud computing makes it increasingly difficult for organizations to determine who is accountable for what mainly because the cloud operates across many mediums. In 2013, for instance, when hackers comprised the systems of Target Corp, a large American-based retail firm, it was extremely difficult to determine who was responsible for the act. In addition, organizations’ websites have also become a target for criminals. The “Anonymous” group is renowned for perpetrating this form of crime. The group, for instance, attacked the Fed’s website in 2013.
To sum up, cloud-based solutions offer efficient ways through which businesses and individuals can enhance their performance. Some of the common examples of these solutions include emails, backup services, and social networks. However, a security breach is a key issue facing most of these services. Cloud-based solutions are exposed to a security threat.
References
Furht, B., & Escalante, A. (2012). Handbook of cloud computing. New York: Springer.
Mahmood, Z. (2014). Continued rise of the cloud: Advances and trends in cloud computing. London: Springer