StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Emerging Technologies: Peer-to-peer and Cloud Computing - Essay Example

Cite this document
Summary
"Emerging Technologies: Peer-to-peer and Cloud Computing" paper focuses on P2P computing technology that allows computers to connect and communicate directly and individually with other computers, and cloud computing involves ten use of the internet to offer certain services. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Emerging Technologies: Peer-to-peer and Cloud Computing
Read Text Preview

Extract of sample "Emerging Technologies: Peer-to-peer and Cloud Computing"

?Peer-to-peer technologies Peer-to-peer technologies were invented in the late 1990s and have seen an increase in the sharing of informationthrough uninhibited through which any internet user can access files easily and at an their own pleasure. This is to mean that the technology is valuable and very important if used in the right way, as it brings with it consequences that are of a legal and security nature. Introduction Peer-to-Peer technology, also known as P2P, refers to computing technology that allows computers to connect and communicate directly and individually with other computers, where it occurs with little or no human input or interference. Computer users, known as peers, share communications, processing power, and even files with one another, in which case the technology is important for as many reasons as it has challenges. Peer-to-peer file sharing is highly beneficial to all users and other potential users based on the intent of use. In this regard, installation of bitTorrent clients is simple, as so is the configuration of all computers on the sharing network. With this in mind, time is saved for purposes that are more constructive rather than spending extended periods working on it. In addition, all resources required for file transfer are shared amongst peers making the file transfer process efficient. This is due to the elimination of servers that store content and are more susceptible to failure, which inconveniences users (Rodrigues and Druschel 2010, p.72). For this reason, p2p allows users to continue functionally without influencing other users thus; is more reliable as compared to server based sharing. In addition, it is relatively cheap as compared to other networks due to the few resources required and elimination of additional hardware. Maintenance and administration is barely required, making it an easily efficient system as each user manages his or her computer/ node thus controlling resource use at no additional cost of inconvenience. Commercially, p2p can be used for distribution of premium content to consumers, such as games, movies, music and software among others (Federal Trade Commission 2005, p.5). This facilitates easy trade in digital content, especially legally licensed content. It can also be used for more services such as video on demand and leasing of copyrighted content by artists and private or independent content producers. Concerning business, p2p sharing can be used for intra-business collaborative project management, where participants in project share documents and personal files with one another. Non-commercially, it can be used for academic purposes to publish research works between and amongst scholars as is seen in the LionShare Project in the Pennsylvania State University (Federal Trade Commission 2005, p.5). In addition, persons or users who do not wish to charge for their content, such as musicians providing free, legal downloads or artists providing writing, art photography and other electronic content may use it. However, despite this, P2p networks are difficult to secure due to the numerous hops made by the network to reach the required files and pieces making it one of the main hurdles that the technology faces. Since p2p is widely implemented over the internet, it is relatively easy to break into using erroneous code responses at the application and network levels leading to denial of service (Krebs 2009). In addition, attacks on the network could occur through where certain users would like to store information, maliciously on available nodes/ user computers against what is allowed. With this, p2p is vulnerable, and trustworthiness of files shared remains in question. In conclusion, the development of p2p has been in progress for a long time and is yet to achieve its ultimate intended goal. As a result, it is crucial to understand its working and problems behind it and by overcoming the stated challenges, the technology could advance greatly for large-scale legal use. Cloud Computing Abstract Cloud computing is a technology that is still young and one that is yet to be tapped to its full potential making it a technology with lots of potential. There are many benefits to its use that range from the cost to the ease of operation and security provided, while there are also as many down sides to having it. These include the insecurity that data in exposed to on both ends of the cloud that refers to the cloud service provider and the cloud service subscriber. Introduction Cloud computing involves ten use of the internet to offer certain services that include storage and sharing of data by users on the same or different networks. This technology is handy in storage, where it saves on costs of data storage equipment and maintenance, while at the same time being hazardous due to insecurity of the storage and malicious use of the data collected. Therefore, cloud computing is highly beneficial following its use in the back up of data periodically as it is created or collected. Instead of having to go through the tedious process of procuring storage devices, cloud computing provides a cheap and efficient means of saving the data of a company without having to maintain its equipment. The advantage lies in the use of third party servers to save data , and not even have to hire qualified staff as the whole process can be automated, eliminating extra costs altogether (Hunter 2012, p.73). In addition, the concept of cloud computing ensures privacy by having regulations cater for the needs of the information, without having to handle much of the security measures. However, there are threats to the future of cloud computing, which include the presence, or rather existence of insecure interfaces and APS, which users tend to use as they access the cloud (Borgmann et al 2012, p.17). The interfaces make use of software for them to access the cloud services leaving the services open to internal and external threats. These could be from customers of such services or even from intruders in need to access and corrupt data and services. The security and the availability of the cloud services depend mainly on the APIs that control the access and encryption of the data on the cloud service and, as a result, there is significant need to secure these APIs, as well as network interfaces that users utilize to access cloud services. Designs are coming up to protect the services from both malicious and accidental attempts to violate the terms of service. In addition, there are new policies that have seen the increase in complexity of layered APIs that sees third parties operate cloud services rather than the actual proprietors. The other common threats to the use of cloud services are the presence of the malicious insider, who seeks to violate the terms of service and use of the cloud. The malicious insider is usually an employee that can steal sensitive and confidential data belonging to eh company and other cloud users. The said malicious insider could also corrupt the data of other users, especially in the case of peer-to-peer file system and sharing. For this purpose, there is need for the company to reveal how different users are granted access to cloud data in order to ensure transparency of usage and prevent malicious intent (Bamiah and Brohi 20118, p.8). In conclusion, cloud computing includes the collection of data in a central place using third party infrastructure and saves companies the trouble of procuring their own infrastructure. It also offers security in different forms, but there are challenges that are yet to be resolved and include unsafe APIs that are used by companies to access their data in the cloud. References Bamiah, M. and Brohi, S. 2011. Seven Deadly Threats and Vulnerabilities in Cloud Computing. International Journal of Advanced Engineering Sciences and Technologies .Vol No. 9, Issue No. 1, 087 - 090 Borgmann, M. 2012. Fraunhofer on the Security of Cloud Storage Services. [Online] Available at. http://www.sit.fraunhofer.de/content/dam/sit/en/studies/Cloud-Storage-Security_a4.pdf [Accessed on 25 Mar. 2013 Federal Trade Commission. 2005. Peer-to-Peer File Sharing Technology: Consumer Protection and Competition Issues. [Online] Available at.. 2013.http://www.ftc.gov/reports/p2p05/050623p2prpt.pdf [Accessed on 25 Mar. 2013] Hunter, P. 2012. "Cloud's Broadcast Benefits." Engineering & Technology (17509637) 7.5: 72-75. Krebs, B. 2009. Congress Investigating P2P Data Breaches. The Washington Post. [Online] Available at. http://voices.washingtonpost.com/securityfix/2009/04/congress_to_probe_p2p_data_bre.html [Accessed on 25 Mar. 2013] Rodrigues, R, and Druschel, P. 2010. "Peer-To-Peer Systems." Communications Of The ACM 53.10 : 72-82.. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/information-technology/1471723-emerging-technologiesy
(Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 Words - 1)
Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/information-technology/1471723-emerging-technologiesy.
“Emerging Technologies Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/information-technology/1471723-emerging-technologiesy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Emerging Technologies: Peer-to-peer and Cloud Computing

Importance of Cloud Computing to Public and Private Firms

The article tries to explain the nearest meaning to the term cloud computing.... cloud computing refers to many applications in the computing business.... cloud computing enables individuals and organizations to use computer applications without the need to buy their own hardware and software.... This essay explores the cloud computing as one of the latest innovations in the field of Information Technology.... Although there is no exact definition to the term cloud computing, it refers to the many applications in the computing business that is provided by a cloud computing provider....
7 Pages (1750 words) Term Paper

Business Information Systems

Similarly, on the hardware and software side, firms are increasingly using cloud computing as a valid alternative to process information.... cloud computing has also allowed firms to reduce their IT costs by hosting or using third-party systems to achieve the same level of productivity and efficiency.... cloud computing Probably one of the most important emerging trends in business information systems and information technology, in general, is the rise of cloud computing....
5 Pages (1250 words) Research Paper

The Role of Adopting Cloud Computing to Lower Energy Consumption in Data Centers

This research proposal "The Role of Adopting cloud computing to Lower Energy Consumption in Data Centers" investigates the economics of data center power management, traditional data center operations vs the emerging cloud computing technologies with regard to their impacts on energy consumption.... Generally, the research will use an interview guide which is primarily designed to investigate the ICT background of the selected respondents, their experiences as well as their knowledge and use of various new data management technologies such as cloud computing in their respective places of work....
6 Pages (1500 words) Research Proposal

Data Communication and Cloud Computing

From the paper "Data Communication and cloud computing " it is clear that in general, cloud computing has provided avenues for organizations to optimize the potential of their employees in terms of training services as an emerging technological innovation.... According to Ross and Blumenstein, cloud computing has been an innovative disruptive technology that is changing how information and communication technologies are accessed and use as its perceived benefits include lower costs, scalability, portability and reduces software and hardware obsolesce....
6 Pages (1500 words) Essay

Research into the reality of having a True Distributed Computer System

We can consider that a distributed computing system is composed of numerous self-governing machines that do not share main memory; however this system works together through transmitting data and messages over a data transfer and communication A distributed computer system is a set of organized independent computers (also known as terminals) that comes into view to its users like a single logical system.... In this scenario this paper will assess some of the main aspects of the development of true Distributed computing Environment which can offer appropriate co-operating subsystems....
12 Pages (3000 words) Essay

Cloud Computing Risks and Security Concerns

This essay "cloud computing Risks and Security Concerns" reviews the risks associated with cloud computing and based on the three service models of this technology, the security concerns would be evaluated.... cloud computing is an emergent technology that has revolutionized the operations of organizations to a great extent.... cloud computing refers to a model that fosters a convenient, on-demand, and ubiquitous access to a network that is shared by a pool of computing resources that could be configured and that could be provisioned and released rapidly with limited service provider interaction or management effort....
12 Pages (3000 words) Essay

Impact of Energy Costs in Information and Technology Sector and Adopting Cloud Computing Technologies

This research proposal "Impact of Energy Costs in Information and Technology Sector and Adopting cloud computing Technologies" is concerned with investigating the potential significance of adopting cloud computing to lower energy consumption in contemporary data centers.... What are the current implications of high energy costs in the information sector and what is the potential significance of using cloud computing technologies to lower energy consumption?...
6 Pages (1500 words) Research Proposal

Cloud Client Computing

This essay discusses that cloud computing has recently become very popular, but there are also many problems.... When these things are not done, the costs of cloud computing soar making the idea of the cloud not as cost beneficial as previously thought.... The first article by Boulton talks of the wastes that are associated with cloud computing.... The researcher of this essay aims to analyze Cloud/Client computing.... It deals with bringing together of cloud and mobile computing with the aim of promoting the development of applications that are centrally coordinated and thus be delivered to any device....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us