Advantages and Disadvantages of Cloud Computing for Businesses [Author] [Institution] Introduction The sphere of technology is expanding significantly over the years. The data storage mechanisms have now been totally transformed since new developments have been taken place. Conventionally hard-disks, DVDs and USB devices were the primary sources of saving data but now the tables have turned over (Chang, et al., 2016). Researchers and computer giants have created 'Cloud Computing' technology which is the virtual storage unit. It requires login and password of the individual to attain data from the virtual device (Cowen, et al., 2016). There is no physical presence of cloud computing only it is virtually accessible. This development has been taken positively and negatively by the technological gurus. They believe there are certain dark sides of this development too which must be kept in mind (Rittinghouse & Ransome, 2016). Businesses have been proactively involved in the cloud computing usage too as several companies are proactively making use of it. One of the greatest issues prevailing in this regard is its security protocols (Carlin& Carran, 2011). Companies offering cloud computing make sure that state of the art security measures are present but still there are severe chances of it getting hacked (Almorsy, et al., 2016). The purpose of this paper is to notify the advantages and disadvantages of cloud computing for businesses Advantages of Cloud Computing Cloud Computing has been quite beneficial for the businesses as it has been able to alter the business dynamics and notions. The companies have been able to capitalize pretty much by using cloud computing mediums and networks (Almorsy, et al., 2016). The organisations have attained benefits of flexibility, efficiency, strategic value, business agility, less capital expense, better use of resources and less operational issues (Chang, et al., 2016). The advantages of cloud computing are hence enormous and the companies have been proactively making use of the advantages attained since the data management is quite convenient and easy. In order to cope up with the world latest trends, global competitions and better positions in the industry, companies have been proactively using cloud computing means and mechanics. The flexibility part provides benefits of scalability, control choices, storage options and security features (Cowen, et al., 2016). The efficiency in terms of accessibility, pay structure, data security, speed to market and savings on equipment has been also attained. It is important to note that the efficiency bar is of significant value and worth and businesses are actually looking forward to it. The strategic values attained for businesses are regular updates, streamlined work, competitive edge and collaborations (Rittinghouse & Ransome, 2016). Businesses require such sort of swift and state of the art processes in order to be sharp and sound in the industrial environments. Cloud computing is the best possible way out in order to be cutting edge in the business environment. Almost every multinational firm around the globe has been making use of cloud computing and the benefits attained from it are phenomenal. The data maintenance and storage options have been quite better due to this venture and it has been literally changing the ways business used to be conducted (Almorsy, et al., 2016). Security Protocols The inception of cloud computing brought a change in the data storage endeavours executed on daily basis; especiallyin the organisations where big data storage servers are installed just to keep the data safe. It is essential that security measures are aligned and maintained at the right pace (Almorsy, et al., 2016). The architecture of cloud security is effective when correct defensive strategy is implemented. The security management setup needs to recognize all the hazards prevailing in the setup. Moreover, security controls need to be checked-up on frequent basis (Hutchings et al, 2011). There are normally four types of control categories in the cloud computing architecture. Deterrent Controls: The job of this control is to reduce attacks on the cloud computing system and provide warning signs to the attackers and the system unit manager itself. The attackers are basically informed by the security control that attacking cloud computing would result in adverse consequences if they'll proceed further (SO, 2011). Preventive Controls: This is the next level security protocol in which eliminating vulnerabilities measures are taken place by the system. Authentication system of cloud users is made quite strong. The security measures are enhanced in which the authenticated users only get access to their cloud drive (Hutchings et al, 2011). Detective Controls: The notion of this control is to detect and then react appropriately against any potential threat. The supporting of communications infrastructure is also the responsibility of the detective controls. The issue remains that it has to detect and maintain the security setup (Liu, 2012). Corrective Controls: Corrective controls maintain a proper system in which consequences of the incident are reduced to substantial levels. The limiting of damage is the name of the game in this entire protocol. The establishment of system backups in order to maintain strong setup is necessary expedition of corrective controls (Behl, 2011). Disadvantages of Cloud Computing There are certain mainstream disadvantages of cloud computing too which must be given considerable importance and substance before generalizing its wider benefits. The availability of stable internet is required 24/7 in order to use cloud computing efficiently (Hutchings et al, 2011). This is considered to be one of the major drawbacks of cloud computing as stable internet connectivity or server issues can prevail for the businesses at any point of time. The security and privacy concern is another leading issue which must be given significant importance. The security barriers removal and competitors invading in private organisational data can be quite tricky. Furthermore, corporate espionage activities can take place conveniently through this medium (Chang, et al., 2016). There is a limited control and flexibility at the business user end therefore it creates severe concerns for the business operations too. The dependencies on cloud computing platforms are massive too and the entire business portfolio has to be dependent on it. Moreover, cloud computing costs are very high and it is not easier for small businesses to cope up with those costs (Almorsy, et al., 2016). The mainstream threats in cloud computing are data management and theft issues. It is to be notified that data theft and hacking are concerning organisations on the broader levels. There have been events in which companies had to compromise their confidential data due to poor security protocols (Rittinghouse & Ransome, 2016). The field of cloud computing is developing therefore state of the art security measures are brought up on regular basis. The research and development in cloud computing in the recent times indicate that now proficient security setups have been established that does not allow any sort of discrepancy in the operational endeavours (Cowen, et al., 2016). The cloud computing endeavours need further maturity but still now computer techies believe they have developed necessary strong setup in which the operations can be taken care off with great affection and care (Mishra et al, 2013). The threats of data theft and hacking are of great importance to the businesses since the entire system can get hacked through this. Big organisations like Microsoft, Apple, Dell, Coca-Cola and IBM have totally deployed themselves on cloud computing just to ensure the world that this is the future of technology and this is how data would be managed in the coming years. The measures taken by the company till date are splendid. Exceptional workings are done by the computer giants for the security of cloud computing. Apple is regarded as the organisation which has the strongest cloud security setup and it has been making the landmark ironically in the recent times. The developments done by Apple so far are praiseworthy as they have managed the operational endeavours in a prolific manner. The management of hacking and theft attempts remains the core responsibility of cloud service providers and under the network security clause; they can be sued for abnormality in any regard (Zissis& Lekkas, 2012). The notion of maintaining systems for data theft and hacking attempts is properly devised by cloud service providers now. Exceptional security services are provided by Apple Incorporation as they have totally managed their setup on Linux. It is rather complex to work on Linux as it is not that simple as of Microsoft Windows. The DOS management in the cloud computing domain is necessary and Apple has been doing it so, on Linux and DOS simultaneously; hence it becomes very difficult for the hackers to sweep into the security network. The workings done so far by Apple Inc are praiseworthy and it requires attention at all points (Chen& Zhao, 2012). Critical Analysis There is certain degree of security agreements between the trusted third parties and the servers itself which must be acknowledged while arguing about cloud security. The acknowledgement of type of data or application, security environment and service-level agreement is must in the data storage and maintenance setup. There have been endeavours in which the role of trusted third party applications has been compromised. The same level of security cannot be provided to every server and data cell. For instance, for social media, service-level agreement is designed and put forward by the trusted third party. Now it depends upon the server and the data administrator either to collide with it or do not accept the development. The security environment is provided according to the service agreement. These elements have to kept in mind while arguing about the level of security in cloud computing (SO, 2011). The attempts to hack and snatch data are basically taking place from the rivalries of the organisations. Businesses sometimes invest a little in the information technology domain and provided minimal amount for the data security. It is very unfortunate as data theft and easy hack actions are taken by the professionals then. It is mandatory to understand that there are several companies that only believe in IT investment are a onetime thing. The Chief Information Officer CIO is also not offered part of the budget for data security. This actually creates problems for the systems administrators as it is necessary to have strong security network which should be maintained appropriately. There have been several drives taken place by the hackers to sweep into large servers like Wal-Mart, Best Buy etc. but it is interesting to note that these companies have not compromised a bit on their security (Munyaka et al, 2012). The domain of artificial intelligence is strongly linked with cloud computing. Cloud computing security is maintained and managed by the artificial intelligence servers too. They tend to inform about the potential threats to the servers and try to hold the attack attempts for a while too. It is important to understand that artificial intelligence setup try its best to safeguard servers from the malware attacks. These attacks cannot be stopped since there are opportunists revolving around the internet realm to take advantage from the hacking activities. The alignment of artificial intelligence with cloud computing must be reckoned at greater levels too. Some strong cyber security army must be devised in the coming days that would not only protect servers from data theft but also from hacking and bugs (Lin et al, 2014). Conclusion The above discussion comprehensively elaborated about the advantages and disadvantages of cloud computing. Considering the rapid evolution of cloud computing in both professional and personal use, the security systems are a necessity for its survival. Cloud computing security system is using different protocols is enabling and revolutionizing interaction on a daily basis. While the threats are eminent, they can be tackled. While hacking is an illegal activity, to check the viability of cloud computing, social hackathons help towards determining the better security protocols. The annual budget is required by the companies to insure the data is safer, whereas it gives much more freedom to companies to grow without worrying about storage. Cloud computing solves the issues by providing data security as well as ease of access to the correct company. Having forecasted a positive percentage of growth in cloud computing system, the demands of cloud computing security system will increase and so will the trust in the society regarding digital security. References Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. Journal of Computing 2(13), 1698-1707 Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In Information and Communication Technologies (WICT), 2011 World Congress on (pp. 217-222). IEEE. Carlin, S., & Curran, K. (2011). Cloud computing security, John Wiley and Sons. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41 Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Cowen, D., Johnston, K. A., & Vuke, K. (2016, August). How cloud computing influences business strategy within South African enterprises. In Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), IEEE International Conference on (pp. 272-278). IEEE Hutchings, A., Smith, R. G., & James, L. (2013). Cloud computing for small business: Criminal and security threats and prevention measures. Lin, G. T., Lin, C. C., Chou, C. J., & Lee, Y. C. (2014). Fuzzy Modeling for Information Security Management Issues in Cloud Computing. International Journal of Fuzzy Systems, 16(4), 529. Liu, W. (2012, April). Research on cloud computing security problem and strategy. In Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on (pp. 1216-1219). IEEE. Mishra, A., Mathur, R., Jain, S., & Rathore, J. S. (2013). Cloud computing security. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 36-39. Munyaka, D., Noviansyah, B., Goel, V., Yenchik, A., & Durham, S. (2012). Cloud Computing Security. Telecommunications Management. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press SO, K. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks, 3(5). Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems, 28(3), 583-592.