Public Personal Clouds

Submitted by: Submitted by

Views: 321

Words: 1272

Pages: 6

Category: Other Topics

Date Submitted: 03/12/2013 06:35 PM

Report This Essay

Public Personal Clouds

Teresa R. Childress-Gilliam

Grantham University

Management of Information Systems

Dr. Cedric Alexander

05 March 2013

ABSTRACT

In recent years, the computer storage device industry has experienced the rapid growth of the

storage service provider (SSP) industry. SSPs, known as cloud storage, are a new trend in

technology that eliminate the need for a physical storage device and offer consumers the ability

to create and store data through the Internet.

Cloud computing appears to hold promise for organizations and individuals by offering a

subscription-based or pay-per-use utility that in real time extends IT capabilities. Through

cloud computing, the hardware and software demands on the user's side decrease. Cloud

computing offers a combination of benefits related to cost and manageability, combined with

concerns about security, data transfer, ease of migration, and true reliability.

Consumers are eagerly and increasingly adopting cloud computing services. The cloud may be

seen simply as another extension of their PC or Android device however unlike traditional

computing functions, this form of outsourcing impacts the consumers’ ability to control their

personal information. Is it possible that we are in the early stages of a computer industry

transformation? What are the privacy risks associated with cloud computing?

Introduction

The hottest trend today in technology is cloud computing. Cloud computing is an

outsourcing technology in which computing functions traditionally controlled by the consumer –

operating and maintaining hardware, installing and running software, storing data – to a third

party service via the Internet (Ozer & Conley, 2010). Cloud computing consumers enjoy the

convenience of accessing their information from any internet-connected device, the ability to

share documents and information with others, and the security of protection from data loss

(Ozer & Conley,...