GPF Interest Rate Date 1/10/2019 To 31/12/2019 - ABP NEWS 247

Monday, 28 October 2019

GPF Interest Rate Date 1/10/2019 To 31/12/2019

GPF Interest Rate Date 1/10/2019 To 31/12/2019

GPF Interest Rate Date 1/10/2019 To 31/12/2019
GPF Interest Rate Date 1/10/2019 To 31/12/2019
GPF Interest Rate Date 1/10/2019 To 31/12/2019

Cloud can be defined in simple terms such as storing a bulk or huge amount of various kinds of data in multiple formats. The hosting of the cloud is nothing but the servers that are interlinked by a distributed connection and forms a network with an edge server as a cloud host.

Cloud host is generally called as cloud computing.

Cloud host is defined by the following implementations

 Managing storage of data-driven by the systems and maintaining corresponding tasks such as getting additional storage capacity which is offloaded to the responsibility of a service provider.

    Cloud storage, the major service provided by the cloud host by providing immediate access to the users based on the broad range of resources and to the allocated hosts which are authorized with the organization along with web service interface.
  It can be used for cloning virtual machine images from the cloud to on-premises sections or to imply a virtual machine image to the cloud image library. In enhancement, cloud storage can be used to move virtual machine images among user accounts or within data centers.

• The other way of using cloud storage is the substitute, as frequently there are 2 or 3 different backup servers located in different places around the earth.

• This can be mapped as a local drive to the WebDAV protocol. It can perform as a primary file server for organizations with multiplied office locations.

Data security

1. When data has been distributed it is stored at more locations increasing the risk of unauthorized physical access to the data. For example, in cloud based architecture, data is replicated and moved frequently so the risk of unauthorized data recovery increases dramatically. Such as in the case of disposal of old equipment, reuse of drives, reallocation of storage space. The manner that data is replicated depends on the service level a customer chooses and on the service provided. When encryption is in place it can ensure confidentiality. Crypto-shredding can be used when disposing of data (on a disk).

2. The number of people with access to the data who could be compromised (e.g., bribed, or coerced) increases dramatically. A single company might have a small team of administrators, network engineers, and technicians, but a cloud storage company will have many customers and thousands of servers, therefore a much larger team of technical staff with physical and electronic access to almost all of the data at the entire facility or perhaps the entire company.

3. Decryption keys that are kept by the service user, as opposed to the service provider, limit the access to data by service provider employees. As for sharing multiple data in the cloud with multiple users, a large number of keys have to be distributed to users via secure channels for decryption, also it has to be securely stored and managed by the users in their devices. Storing these keys requires rather expensive secure storage. To overcome that, key-aggregate cryptosystem can be used.

4. It increases the number of networks over which the data travels. Instead of just a local area network (LAN) or storage area network (SAN), data stored on a cloud requires a WAN (wide area network) to connect them both.

5. By sharing storage and networks with many other users/customers it is possible for other customers to access your data. Sometimes because of erroneous actions, faulty equipment, a bug and sometimes because of criminal intent. This risk applies to all types of storage and not only cloud storage. The risk of having data read during transmission can be mitigated through encryption technology. Encryption in transit protects data as it is being transmitted to and from the cloud service.

6. Encryption at rest protects data that is stored at the service provider. Encrypting data in an on-premises cloud service on-ramp system can provide both kinds of encryption protection.


Companies are not permanent and the services and products they provide can change. Outsourcing data storage to another company needs careful investigation and nothing is ever certain. Contracts set in stone can be worthless when a company ceases to exist or its circumstances change.

Companies can
1. Go bankrupt.
2. Expand and change their focus.
3. Be purchased by other larger companies.
4. Be purchased by a company headquartered in or move to a country that negates compliance with export restrictions and thus necessitates a move.
5. Suffer an irrecoverable disaster.


• Performance for outsourced storage is likely to be lower than local storage, depending on how much a customer is willing to spend for WAN bandwidth

• Reliability and availability depends on wide area network availability and on the level of precautions taken by the service provider. Reliability should be based on hardware as well as various algorithms used.

• It’s a given a multiplicity of data storage.

NotificationClick Here

No comments:

Post a Comment