Using proxies to facilitate collaboration in Multi-Cloud Computing Environments
|
|
|
- Prosper Stokes
- 10 years ago
- Views:
Transcription
1 Using proxies to facilitate collaboration in Multi-Cloud Computing Environments 1 Solmaz Vaghri, 2 Mohan KG 1 M.Tech Student, 2 Professor Dept. CSE Acharya Institute of Technology (Affiliated to VTU) Bangalore, India 1 [email protected], 2 [email protected] Abstract As cloud computing becomes more predominant, the problem of scalability has become critical for cloud computing providers. For the client to be able to simultaneously use services from multiple clouds; individually interaction with each cloud service provider, gathering intermediate results, processing the collective data, and generating final results is necessary. Collaboration among multiple cloud-based services, like cloud mashups, opens up opportunities for Cloud service providers (CSP s) to offer more-sophisticated services that will benefit clients. Today, cloud mashups need preestablished agreements among providers. This approach to building new collaborative services does not support agility, flexibility, and openness. This paper present the survey of the proxy-based multi-cloud computing framework which provides on the-fly, dynamic collaborations and cloud-based resource sharing services, addressing, policy trust, and privacy issues without preestablished collaboration agreements or standardized interfaces. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Resource pooling. The provider s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. Location independence means that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth. Keywords- Cloud Computing, data privacy, Collaboration, cloud-based services, security of data. I. INTRODUCTION Cloud computing is a pay per utility model for enabling ubiquitous, on-demand network based access to a shared configurable pool of computing resources such as networks, servers, storage, applications, etc. It can be rapidly provisioned and released with minimal effort for managing or service provider interaction. According to NIST cloud computing provides following essential futures [1]: On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. The development of cyber societies and online transactions imposes continuously organizations expanding their IT infrastructure. Cloud computing services become their nominal solutions since they provide economic benefits; they reduce hardware and 27
2 software expenses while canceling out related maintenance and upgrade costs. They offer flexible and on demand access to appropriate level of computation, memory, and storage resources. The advantage is brought by their multitenant feature, which enables an IT asset to host multiple tenants [5]. As more organizations employ cloud computing, cloud service providers (CSPs) are motivated for developing new technologies in order to enhance the capabilities of clouds. Cloud mashups have a similar structure to distributed data mining applications merges different services from several clouds into a single service, possibly in client side data and service. This service composition allows CSPs offer new functionalities at lower development costs to clients. Examples of cloud mashups and technologies to support them include IBM s Mashup Center, Appirio Cloud Storage and Force.com for the Google App Engine [3]. Today, cloud mashups require pre-written agreements among provider and also use of custom-built, recovery tools that combine services through low-level, tightly controlled and constraining integration techniques. This approach to building new collaborative services does not support agility, flexibility, and openness. Realizing multi-cloud collaboration s full potential will require implicit, transparent, universal, and on-the-fly interaction involving different services spread across multiple clouds that lack pre-established agreements and proprietary collaboration tools [3]. The research community is beginning to develop architectures, technologies, and standards to support collaboration among multiple cloud systems [2]-[5]. However, these research proposals still remain constraining due to their provider-centric approach or limited scope. Provider-centric approaches require CSPs to adopt and implement the standardized interfaces, protocols, formats, and other specifications, as well as new architectural and infrastructure components to facilitate collaboration, such that without these providercentric changes, current proposals do not provide facilities for client-centric, on-the-fly, and opportunistic combinations of heterogeneous cloud-based services. While cloud standardization will promote collaboration, there are several hurdles to its adoption [6], [7]. For cloud collaboration to be alive, it is needed to developed mechanisms allowing opportunistic collaboration among services without requiring standards and extensive changes to the cloud service delivery model [3]. towards cloud collaboration. It is a cross-cutting concern influencing all other aspects of the collaboration.in depth security analysis for identifying new threats and concerns resulting from collaboration must be considered to maintaining privacy of data and identity during collaboration, establishing trust among different cloud providers and addressing policy heterogeneity among multiple clouds so that composite services will include effective monitoring of policy anomalies to minimize security breaches [3]. This survey is organized as follows: In Section II, we discuss about proxy based framework in the area of interconnected Cloud environments to clarify the positioning of this work. In Section III, we explore the possible proxy architecture model between Clouds. Then, we discussed security issues for multiple Cloud collaboration in Section IV. Finally, we conclude the study and provide a basis for future developments in this area. II. PROXY BASED FRAMEWORK FOR CLOUD COLLABORATION Collaboration framework for multi-cloud systems allows applications and clients to use services simultaneously and also route data among multiple clouds without adopting standards, specifications and pre-established agreements among cloud providers. The following restrictions in the current cloud computing model prevent direct collaboration among applications hosted by different clouds [3]: Pre-established business agreements. The current business model requires pre-established agreements between CSPs before collaboration can occur. These agreements are necessary for clouds to establish their willingness to collaborate and establish trust with one another. The lack of such agreements prohibits multi-cloud collaborative efforts due to incompatible intentions, business rules, and policies. Moreover, collaborations resulting from pre-established agreements typically exhibit tight integration between the participants and cannot be extended to provide universal and dynamic collaboration Service delivery model. Clouds use a service delivery model that provides service access to legitimate subscribing clients and denies all other requests because of security and privacy concerns. This prevents direct interaction between services from different clouds. This approach will allow incremental provisioning of collaborative services to clients, which will continue to improve as more cloud services become interoperable in the future. Security is probably the hardest and most important problem that needs to be solved on the way Also, CSPs typically package their service offerings with other resources and services. This results in a tight dependency of a service on the hosting CSP. Such a service delivery model limits a client s ability to 28
3 customize a service and use it in combination with service offerings from different CSPs. set of physical nodes connected via an underlying network infrastructure. Heterogeneity and tight coupling. Clouds implement proprietary interfaces for service access, configuration, and management as well as for interaction with other cloud components. Each service layer of a cloud tightly integrates with lower service layers or is highly dependent on the value-added proprietary solutions that the cloud offers. This heterogeneity and tight coupling prohibit interoperation between services from different clouds. To overcome this restriction a network of proxies can be used. A proxy is an edge-node-hosted software instance that a client or a CSP can delegate to carry out operations on its behalf [3]. The proxy network consists of a large number of logically connected edge nodes that may assume a rich set of data roles to boost the performance and reliability of distributed data-intensive applications, including [14]: Cloud service interaction: A proxy may act as a client to a cloud service. This role allows a proxy with better network connectivity to access one or more cloud services. For example, a proxy may have very high bandwidth to/from a cloud service relative to the end-user. Computing: A proxy may carry out computations on data via a set of data operators. This role allows a proxy to filter, compress, merge, mine, and transform data. We envision a set of well-defined data operators C 1, C 2,...,C k where Ci: D in D out, that is, Ci maps an input data into an output data. Caching: A proxy may efficiently store and serve data to other nearby proxies that may consume the data later on. Proxies can also cache intermediate results from a cloud interaction that may be reused again. Routing: A proxy may route data to another proxy as part of an application workflow. This role allows a proxy to efficiently send data to another proxy for additional processing, caching, cloud service interactions, etc. This role is particularly important if the application is interacting with multiple clouds which are all widely distributed, and there may be no single proxy that can efficiently orchestrate all of these interactions. The real power of proxies lies in the combination of these roles. Depending on the situation, the system can employ a network of proxies as a collection of virtual software instances logically connected via a virtual network or a The basic idea is to enable proxies that act on behalf of a subscribing client or a cloud to provide a diverse set of functionalities: cloud service interaction on behalf of a client, data processing using a rich set of operations, caching of intermediate results, and routing, among others. With these additional functionalities, proxies can act as mediators for collaboration among services on different clouds [3]. As an example, if a client or CSP wants to simultaneously use a collection of services that multiple clouds provide. First, the requesting entity selects proxies for acting on its behalf as delegator and to interact with cloud applications. A client or a CSP might use multiple proxies to interact with many CSPs. It can select proxies based on several factors, for example, delays between clouds and proxies or workload conditions at various proxies. Once it chooses proxies, the client or CSP delegates the necessary servicespecific privileges to the proxies to carry out the service request using the necessary security precautions [3]. These proxies can further delegate to other proxies if necessary and initiate the service request. In some instances, clients or CSPs can assign special roles to one or more proxies in the network to coordinate the operations in a service request among the multiple delegate proxies [3]. Following delegation, the requesting entity need not further interact with the proxy network until the proxies complete the service request. During execution of a service request, proxies would interact with cloud-based applications, playing the role of the service subscriber(s). By independently requesting services from the clouds, and by routing data between each other in a manner transparent to cloud applications, proxies can ease collaboration without requiring prior agreements between the CSPs. Proxies can also perform operations to help solve incompatibilities among services to allow data exchange between them [3]. III. PROXYARCHITECTURE MODEL Cloud computing depend on sharing of network connected resource clusters such as server farms, data warehouses, and so on that host geographically distributed virtual machines and storage components that ensure scalability, reliability, and high availability. Cloud resources are not only shared by multiple users but dynamically can be re-allocated per demand. A multi-cloud system model that employs proxies for collaboration consists a set of cloud services logically connected by a proxy network, and has three principle entities: (1) cloud services (2) proxy network, and (3) client s application initiator. Such systems can use 29
4 several possible strategies for placing proxies in the proxy network. use its services. A. Cloud -hosted proxy As Figure 1 shows, each CSP can host proxies within its cloud infrastructure, administer all proxies within its domain, and handle service requests from clients that wish to use those proxies for collaboration. The proxy instances might need to be CSP specific. For example, in Figure 1, both C1 and C2 might mutually and dynamically provision sharing and collaboration logic as proxy virtual instances within their respective administrative domains [3]. Figure2. Proxy as a service, CSPs set up proxies as an autonomous cloud system and offers it as a service to client. (a) A client uses two proxies to collaborate with CSPs C 1 and C 2. (b) Alternatively, a client starts request services with C1, which then detects the need for a service from C 2. D. On-premise proxy Figure1.In this case client sends a request to C1, which dynamically detects the need to use services from other clouds C2 and C3. The proxies will be employed by C1 to administer these interactions. B. Proxy as a service This case involves using proxies as an autonomous cloud that provides collaborative services to cloud service providers as well as clients ;as shown in figure 2 [3]. A group of CSPs that are ready to collaborate can administer this proxy-as-a-service cloud, or a proxy service provider (PSP), can provide administration. Clients directly interact with proxy cloud service and employ them for inter-cloud collaboration. C. Peer-to-peer proxy Proxies can also interact in a peer-to-peer network managed by either a PSP or a group of CSPs that wish to collaborate. Another possibility is for proxies to have no collective management: each proxy in the peer-to-peer network is an independent entity that manages itself [3].In this case, the proxy itself must handle requests to In the scenario shown in Figure3, a client can host proxies within its organization s infrastructure (or on premises) and manage all proxies within its administrative domain [3]. A client that wishes to use proxies for collaboration will employ its on-premises proxies, whereas CSPs that wish to collaborate with other CSPs must employ proxies that are within the domain of the service-requesting client. E. Hybrid proxy infrastructure A hybrid infrastructure can include on-premises, CSPand PSP-maintained, and peer to- peer proxies. Selecting proxies for collaboration will depend on the type of service being requested and the entity that initiates collaboration, among other factors [3].For example, clients that must initiate a service request with two CSPs can employ on-premises proxies for collaboration. On the other hand, a cloud-based application that discovers it needs a service from another CSP to fulfill a client s request can employ a CSP-maintained proxy. The proposed architectures illustrate the various options that are available for deploying proxies to support collaboration [3]. 30
5 IV. SECURITY ISSUES IN MULTICLOUD COLLABORATION Generally, trust typically refers to a situation where one party is willing to trust on the actions of another party; Control over the actions left by the former to the latter. Ultimately, there is an uncertainty if the trusted party will behave or deliver as promised. The cloud computing is still in its beginning steps, so current status is associated with numerous challenges like security, performance, availability, integrity, cost etc. Out of these, security issue has the most important role in obstructing cloud computing. Putting data, running application at someone else s hard disk using someone else s CPU seems daunting to many. Researchers have highlighted several major security issues in cloud computing, including isolation management, data exposure and, virtual OS security, trust and compliance, and mission assurance, confidentiality, integrity and availability [8]-[16]. Figure3. On- premises proxy. Proxies are deployed within the infrastructure of client s organization. (a) A client employs two proxies to collaborate with CPS s C 1 and C 2 (b) A client starts requesting services with cloud C 1, which then detects the need for a service from C 2. Developing these architectures serves as the first step in building a proxy-based, collaborative, multi-cloud computing environment. A complete solution will entail several additional tasks. For example, an important task is a comprehensive study and evaluation of the proposed proxy-based architectures. Such an evaluation must cover architecture s possible variations under diverse practical use cases and scenarios for multi-cloud collaboration. Based on this study, researchers can refine the proposed architectures, develop new variations to support different scenarios and use cases, and, if possible, merge the architectures into a universal proxy-based architecture for multi-cloud collaboration. Another important task is developing a full suite of protocols and mechanisms that proxies must implement to support all the functionalities necessary for acting as mediators among services from multiple clouds. For example, supporting collaboration scenarios migrate a client-subscribed virtual machine from one cloud to another requires techniques for translation between various virtual machine packages and distribution formats [3]. Using Proxies for collaboration require trust where the need for trust arises because a client leaves direct control of its assets security and privacy to a CSP. These risks include insider security threats, weakening of data ownership rights, transitive trust issues with third-party providers in composite cloud services, and diminished oversight of system security [8]. So a client should give a high level of trust to a CSP based on its ability to implement effective controls and processes to secure assets. Thus, a client must be able to accept the higher levels of risk in using cloud-based services.by using proxy trust boundary increase because clients and CSP must accept proxy s security and establish trust with proxies [3]. For establishing a trust relationship, CSP must trust the proxy to legitimately act on behalf of the client or another CSP. Proxy networks are a potential platform for developing proxy-based security architectures and solutions for multi-cloud systems. At a minimum, the proxy network must implement security and privacy mechanisms that mirror, extend, or complement similar mechanisms offered by clouds to maintain asset protection outside the domain of clouds and client organizations [8]. In addition, clients, clouds, and proxies must implement mechanisms that ensure secure delegation, which entails the following [3]: On-the-fly agreements. Delegating to a proxy must establish, on the fly, an explicit agreement between the delegator and proxy that lets the proxy act on the delegator s behalf. Techniques for delegation to a proxy must include mechanisms that restrict the proxy s behavior, including data and resource 31
6 access, to comply with delegator-specified constraints[3]. Expected behavior. After delegation, a proxy must not deviate from the expected behavior. It must act only on behalf of the delegator (a client or a CSP). After the proxy fulfills the service request, it can no longer act on the delegator s behalf. The proxy cannot modify the intended service request or misuse client assets, and it must not transitively delegate its capabilities to other proxies without the delegator s explicit consent[3]. When proxies enable dynamic collaboration between multiple CSPs, heterogeneous security policies can be the source of policy conflicts that result in security breaches. Even though existing policy evaluation mechanisms can verify individual domain policies, security violations can easily occur during integration [12]. Proxies must analyze relationships between policies to detect and resolve policy anomalies using mechanisms that easily adapt to handle composite policies evaluated as a whole. Possible policy anomalies include policy inconsistencies and inefficiencies. Once proxies identify conflicts, they must use conflict resolution strategies to resolve them. However, current conflict resolution mechanisms have limitations. Multicloud environments require adaptively applying different algorithms to resolve different conflicts. For keeping Identity attributes and data privacy in shared computing environments like clouds, protecting the privacy of client assets is critical.[8] The privacy issues pertaining to both data and identity. Privacy protection methods (other than encryption) fall broadly into two categories [15]. Data perturbation (also known as input perturbation), which adds some form of noise to the data itself, and Output perturbation, which adds noise to the otherwise accurate query answers. Earlier research studied data privacy in outsourcing data aggregation services [16]. Regardless of the methods used to maintain data privacy, the resulting solution must scale to use for large amounts of data and many CSPs. V. CONCLUSION In this paper we have introduced the concept of a proxy network to accelerate dynamic collaboration spanning multiple specialized clouds. The proposed framework employs proxies to act as mediators between applications in multiple clouds that must share data; it has ability to overcome several restrictions in the current cloud computing model that can restrict dynamic collaboration among applications within different cloud systems. Future works oversight for the proposed framework includes refining the proxy deployment scenarios and development of infrastructural and operational components of a multi-cloud system. This must be accompanied by implementation of an experimental platform using open source tools and libraries that work in combination with real-world cloud services to evaluate the system s functionality and limitations, and make further refinements and also exploring techniques that can identify suitable proxies automatically based on application needs. REFERENCES [1] P. Mell and T. Grance, The NIST Definition of Cloud Computing, special publication , Nat l Inst. Standards and Technology, 2011, p. iii + 3. [2] D. Bernstein and D. Vij, Intercloud Security Considerations, Proc. 2nd Int l Conf. Cloud Computing (CloudCom 10), IEEE Press, 2010, pp [3] M. Singhal and S. Chandrasekhar, T. Ge, R.Sandh and R. Krishnan, G. Ahn E. Bertino, Collaboration in Multicloud Computing Environments: Framework and Security Issues Published by IEEE Computer Society, Feb [4] R. Buyya et al., Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility, Proc. 9th IEEE/ACM Int l Symp. Cluster Computing and the Grid (CCGRID 09), IEEE CS, 2009, pp [5] B. Rochwerger et al., Reservoir When One Cloud Is Not Enough, Computer, Mar. 2011, pp [6] M.P. Papazoglou and W. van den Heuvel, Blueprinting the Cloud, IEEE Internet Computing, Nov./Dec 2011, pp [7] S. Ortiz Jr., The Problem with Cloud Computing Standardization, Computer, July 2011, pp [8] P. Mell and T. Grance, Perspectives on Cloud Computing and Standards, NIST Information Technology Laboratory, Nat l Inst. Standards and Technology, 2008; 32
7 /minutes/ /cloudcomputing- standards_ ISPAB Dec2008_P-Mell.pdf. [9] W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, special publication , Nat l Inst. Standards and Technology, 2011, p. x [10] Gundeep S, Prashant K, Krishen K, seema Kh cloud security: Analysis and risk management of VM images Proceeding of the IEEE International Conference on Information and Automation Shenyang, China, June 2012 [11] C.M. Ellison et al., SPKI Certificate Theory, IETF RFC 2693, Sept. 1999; [12] E. Hammer-Lahav, ed., The OAuth 1.0 Protocol, IETF RFC 5849, Apr. 2010; [13] Y. Zhang and J.B.D. Joshi, Access Control and Trust Management for Emerging Multidomain Environments, Ann.Emerging Research in Information Assurance, Security and Privacy Services, Emerald Group Publishing, 2009, pp [14] Jon Weissman Using proxies to accelerate cloud applications Proceeding HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing,article No. 20 [15] J. Weissman and S. Ramakrishan, "Using Proxies to Accelerate Cloud Application, Proceeding HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing, No. 20, USENIX Association Berkeley, CA, USA 2009 [16] N.R. Adam and J.C. Wortmann, Security- Control Methods for Statistical Databases: A Comparative S16. L. Xiong, S. Chitti, and L. Liu, Preserving Data Privacy in Outsourcing Data Aggregation Services, ACM Trans. Internet Technology, Aug. 2007, p
IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:46 NO:2 YEAR 2013
Research Research Feature Feature IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:46 NO:2 YEAR 2013 Collaboration in Multicloud Computing Environments: Framework and Security Issues Mukesh Singhal and Santosh
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government
The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Capability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
PRIVATE CLOUD PLATFORM OPTIONS. Stephen Lee CEO, ArkiTechs Inc.
PRIVATE CLOUD PLATFORM OPTIONS Stephen Lee CEO, ArkiTechs Inc. WHAT IS THE CLOUD? Virtualization? Virtualization hosted by someone else? NIST DEFINITION (SP 800-145) Cloud computing is a model for enabling
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
Using Proxies to Accelerate Cloud Applications
Using Proxies to Accelerate Cloud Applications Jon Weissman and Siddharth Ramakrishnan Department of Computer Science and Engineering University of Minnesota, Twin Cities Abstract A rich cloud ecosystem
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
A Cloud Computing Handbook for Business
White Paper A Cloud Computing Handbook for Business By Dr. Wolfgang Rohde, Douglas Clark and Jimmy Hum A Cloud Computing Handbook for Business Abstract Business demands for more flexible and cost effective
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS
193 APPENDIX 1 CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS A 1.1.1 Cost Savings The biggest reason for shifting to cloud computing is cost. Any company or enterprise has to face sizable
CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY
1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Getting Familiar with Cloud Terminology. Cloud Dictionary
Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know
ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC
ITSM in the Cloud An Overview of Why IT Service Management is Critical to The Cloud Presented By: Rick Leopoldi RL Information Consulting LLC What s Driving the Move to Cloud Computing Greater than 70%
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly
OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly 10/24/2011 Office of Information Technology Table of Contents Executive Summary... 3 The Colorado Cloud...
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
Analysis and Strategy for the Performance Testing in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 10 Version 1.0 July 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds
sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service
Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:
Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
Load Rebalancing for File System in Public Cloud Roopa R.L 1, Jyothi Patil 2
Load Rebalancing for File System in Public Cloud Roopa R.L 1, Jyothi Patil 2 1 PDA College of Engineering, Gulbarga, Karnataka, India [email protected] 2 PDA College of Engineering, Gulbarga, Karnataka,
Software as a Service (SaaS) Testing Challenges- An Indepth
www.ijcsi.org 506 Software as a Service (SaaS) Testing Challenges- An Indepth Analysis Prakash.V Ravikumar Ramadoss Gopalakrishnan.S Assistant Professor Department of Computer Applications, SASTRA University,
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Li Sheng. [email protected]. Nowadays, with the booming development of network-based computing, more and more
36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng [email protected] Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
White Paper. Cloud Vademecum
White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS
Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies
Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
Security Issues On Cloud Computing
Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow
Soft Computing Models for Cloud Service Optimization
Soft Computing Models for Cloud Service Optimization G. Albeanu, Spiru Haret University & Fl. Popentiu-Vladicescu UNESCO Department, University of Oradea Abstract The cloud computing paradigm has already
Public Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini
Business Intelligence (BI) Cloud Prepared By: Pavan Inabathini Summary Federal Agencies currently maintain Business Intelligence (BI) solutions across numerous departments around the enterprise with individual
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Cloud Computing: Advantages and Security Challenges
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 8 (2013), pp. 771-778 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
