6 Jun 2022

121

Storing Digital Information

Format: APA

Academic level: College

Paper type: Case Study

Words: 417

Pages: 1

Downloads: 0

Introduction 

There are several types of cloud storage that are currently known. They come in different forms and shapes. People select cloud storage depending on the degree of storage and also, on the associated cost. This paper will review two additional types of clouds to the ones that were earlier on discussed in class. We had covered Google Drive and Dropbox. The paper, therefore, will discuss IDrive and BackBlaze. 

IDrive 

This type of cloud allows the user 5GB of storage and can be used on any machine. Additional space can be obtained at approximately $5 a month for 150 GB. There is no free trial, and the cloud is only limited to Mac and Windows. The cloud enables the user to back up a large quantity of data such as PC data, Mac, and Facebook pictures in a similar account (Kamara and Lauter, 2010). For business users, the cloud allows them to back up business servers, computers, SQL, Exchange and mobile appliances. IDrive provides the users with strong privacy options, seeing as information is encrypted with the help of 265-bit AES encryption. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

BackBlaze 

This cloud is also obtained at the cost of $5 per month. The user is entitled to unlimited online backup with half a month free trial. The cloud is designed to suit most of the cloud services, and the user is only required to download and install the software where the backup of the software frequently occurs (Wu, Ping, Ge, Wang and Fu, 2010). The software can search for music and photos, and also, for other important files on the computer. In the event that the computer is not in use, BackBlaze copies, compresses and encrypts important documents and files before storing them in a secure location. Encryption ensures that information cannot be accessed or interfered with by intruders. 

Conclusion 

From the four cloud storages, I consider Dropbox to be a perfect storage solution for users. Despite the fact that it is too expensive as compared to the other three cloud storages, DropBox offers the user a far larger storage capacity of 10000GB (Wu et al., 2010). Additionally, 2GB is offered freely to the user. It is also available for Linux, Mac, and Windows users, implying that it serves all people. It also allows the user to share files and other important information with friends and family members, even if they don't own a Dropbox account. Lastly, Dropbox offers maximum security as compared to the other three cloud storages. Conversely, Dropbox users are in no way capable of knowing the encryptions under which there information is stored, as this knowledge is the preserve of Dropbox developers. As such, Dropbox is disadvantageous in that its users do not enjoy an absolutism of privacy and control of their accounts. 

References 

Kamara, S., & Lauter, K. (2010,). Cryptographic cloud storage. In International Conference on Financial Cryptography and Data Security (pp. 136-149). Springer Berlin Heidelberg. 

Wu, J., Ping, L., Ge, X., Wang, Y., & Fu, J. (2010). Cloud storage as the infrastructure of cloud computing. In Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on (pp. 380-383). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Storing Digital Information.
https://studybounty.com/storing-digital-information-case-study

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration