SE-CNC - A Brazilian Experimental Cloud Storage Service

Size: px
Start display at page:

Download "SE-CNC - A Brazilian Experimental Cloud Storage Service"

Transcription

1 SE-CNC - A Brazilian Experimental Cloud Storage Service Roberto ARAUJO 1, Carlos Eduardo DA SILVA 2, Thomás DINIZ 2, Tainá MEDEIROS 2, André MARINS 3, Michael STANTON 3 1 Federal University of Pará UFPA INF, Augusto Corrêia Street, Guamá, ZIP , Belém, Brazil Tel: , rsa@ufpa.br 2 Federal University of Rio Grande do Norte UFRN INF, Senador Salgado Filho Av, Lagoa Nova, ZIP , Natal, Brazil Tel: , kaduardo@imd.ufrn.br, thomasfdsdiniz, tainajmedeiros@gmail.com 3 Brazilian National Education and Research Network, RNP, 116 Lauro Muller st, room 1103, ZIP , Rio de Janeiro, Brazil Tel: , Fax: , amarins, michael}@rnp.br Abstract Cloud-based storage services are increasingly common tools in the everyday life of teachers and researchers. Thus, the Cloud business model is a trend for those who are looking for scalability, availability, flexibility and fewer maintenance issues. The increasing demand for collaborative work has driven these users to commercial cloud solutions, such as Dropbox, Google drive or OneDrive, as the means to save and share presentations, lecture notes or research documents. Although those solutions offer many benefits for their users, they have a number of disadvantages, for example, commercial clouds store data on their own servers, which are subject to local rules and government laws, which are often not the same rules and laws to which their users are subject. Another disadvantage is related to the terms of use/privacy policy. In this context, we present CNC Cloud, Cloud Computing for Science, a project sponsored by the Brazilian NREN RNP (Rede Nacional de Ensino e Pesquisa), which aims to offer a cloud storage service for researchers and lecturers at Brazilian education and research institutions. Keywords: Owncloud, Security, Cloud Computing. 1. Introduction Historically, the evolution of information technology has been characterized by innovation and the creation of new paradigms. This behavior has repeated itself with the appearance of cloud computing, a distributed computing model where shared computational resources (e.g., hardware, development platforms, and applications) are virtualized and offered as services, supported by a number of data centers all over the Internet (Armbrust et al. 2010, Foster et al. 2008, Vaquero et al. 2009). This movement has raised a lot of interest in different communities. Nowadays, there are a number of commercial cloud service providers (e.g., Amazon, Google, Microsoft), which have been adopted by users with different profiles (home users, scientific and private communities) for saving and sharing different types of documents, such as presentations, lecture notes, and research documents. Page 1 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

2 Although those solutions offer many benefits for their users, they present a number of disadvantages. In general, commercial clouds store data on their own servers. Those servers, and the data stored on them, are subject to local rules and government laws, usually different from those to which their users are subject. Another disadvantage is related to the terms of use/privacy policy. Cloud services can, and usually do, update their terms of use in accordance with their business interests, rendering the user defenseless with respect to the ownership of their data. Thus, although there is a search for reliable and internationally recognized standards, there is still no clarity and consensus regarding the rights and obligations between the parties involved in a model of Cloud Computing. In particular, data stored in commercial clouds can be vulnerable to unauthorized and undesired monitoring and manipulation by the service provider or even third parties. In this context, RNP has been funding the CNC Cloud Project, an R&D Project which is part of RNP s Working Group (WG) Programme since The main objective is to offer a cloud storage service, which does not depend on foreign service providers and is based on open source technologies, to Brazilian education and research institutions. This service also focuses on data privacy, aiming at providing secure data storage. The CNC Cloud project has built an infrastructure with a backend based on the OpenStack software and a frontend whose user access interface is based on Owncloud. Currently, the project is in an experimental phase in which it will deliver a pre-production cloud storage service environment, with servers hosted at different Brazilian Federal Universities and some Points of Presence (PoPs) of RNP s national backbone network. This paper is organized as follows: Section 2 presents concepts of cloud computing and identity Federation. In Section 3, we describe the development of the experimental service, based on the CNC Cloud project, and how its architecture works. In Section 4 the results of the tests that have been performed with CNC Cloud will be presented. Finally, Section 5 presents the conclusions and some future work. 2. Background 2.1 Cloud Computing Cloud computing is a relatively new business model in the computing world. According to NIST definition, cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services). NIST also defines three service models for cloud computing: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). SaaS is the model that provides to the user applications running on cloud infrastructure. PaaS provides to the user a cloud environment to deploy its own applications using programming languages, libraries and services supported by the cloud. IaaS aims to provide fundamental computing resources such as processing, storage, networks to the user. In this case, the user does not control underlying cloud infrastructure, he controls over deployed operations. Currently, many users have signed up to some type of cloud service, such as storage services (e.g., Dropbox 1 ), and virtual machine services (e.g., Amazon 2 ). Moreover, the use of cloud services has gained widespread adoption beyond that of a single user, and can now be perceived in a number of environments, such as companies, research centres, universities, and Page 2 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

3 so on. Thus, the increasing use of cloud computing services has required a new architecture and design solutions to support those demands Openstack is a toolbox to build cloud infrastructures, one of which is the Object Storage (Swift). Swift allows the creation of storage clouds. Thus, Swift is composed by modules that perform specific services for the cloud and has a distributed deployment approach, with storage servers and proxy servers. Keystone is an OpenStack project that aims to provide a service for Identity management. OpenStack projects the use of keystone to authenticate users wishing to access cloud services. In our infrastructure Keystone is deployed on proxy nodes. The native Keystone authentication process is based on the use of tokens as credentials. After successful authentication, the user receives a token to enable access to cloud services. 2.2 Identity Federation Cloud services are normally made available to a large number of users from different domains (such as schools and colleges), that need to be authenticated before gaining access. This authentication is usually carried out by well-known mechanisms and the cloud can be responsible for all authentication management, including the storage of user access information. However, as the number of users increases, the authentication process becomes more complex, and so the cloud services are starting to find other alternatives, in order to facilitate it. A federated identity management system consists mainly of service and identity providers. These providers establish a trust relationship for exchange of user information, in order to allow access to the resources (Chadwick 2009; Wangham et al. 2010). A service provider (SP) offers resources to a user, who is authenticated through an identity provider (IdP). Besides performing user authentication, the IdP is also responsible for issuing attribute assertions to the authenticated user. An attribute corresponds to a characteristic or property of a user, whereas an attribute assertion is an affirmation made by the IdP, through a message signed digitally, saying that a user possesses a particular attribute. By utilizing the attributes that belong to the user, an SP will then, based on its own access control policies, make decisions about the resources and operations requested by a user. There are many technologies that can help the development of identity federated management systems, such as SAML and OpenID Connect4. RNP s Identity Federation name CAFe utilizes SAML (Security Assertion Markup Language) (OASIS 2008). It defines standard messages and protocols for safe sending and receiving users identity information. Besides, SAML also sets a group of roles that can be performed by an entity in the SAML infrastructure, as well as the metadata that describes these entities (Wangham et al. 2010). 3. CNC Cloud 2.3 Infrastructure Overview Aiming to provide a safe, reliable and scalable data storage service in the cloud, the CNC Cloud project carried out an extensive study of tools for building a cloud. The experimental service considers the community cloud model implementation and the IaaS model, where the end user accesses the cloud through a web client and acquires access to stored files. All operations are performed using load balancers that ensure the high availability and scalability of the cloud. Figure 1 shows an overview of the architecture. Page 3 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

4 Figure 1: Overview of the architecture 2.4 CNC Cloud Architecture CNC Cloud components can be deployed in different servers and provide the named services: proxy, object, container and account. The proxy server receives user requests and forwards them to the cloud storage services. Currently the CNC experimental phase uses three proxy servers. Each one of these services is deployed on a different server. One of the servers is located at the Federal University of Pará (UFPA), the second at the Federal University of Santa Catarina (UFSC), and the third at the Federal University of Minas Gerais (UFMG). Figure 2 shows the disposition of these servers. It is important to note that, in order to meet a larger number of user requests, more proxy servers can be added to the architecture in the future. These 3 proxy servers utilize load balancing performed through round-robin DNS. The communication between the proxy servers and the users uses the HTTPS protocol. However, in order to provide the storage service to users, the cloud requires some form of authentication. For this, it was decided to include the cloud service in RNP s Identity Federation for research and development projects, named CAFe Expresso. This federation authenticates the user to access the cloud resources. The account, container and object services take care of the data storage. The object service handles object storage, the container service handles the list of objects inside the containers, and the account service handles the list of containers. In the cloud, all three services can be deployed on a single server known as the Storage Node. The experimental phase of CNC Cloud Project has a total of 15 (fifteen) servers (nodes) of storage, that can be seen in Figure 2 of this section. Each storage server provides these three services: Object, Container and Account. These servers make up the storage cloud and are responsible for storing user data. A ring concept determines where the data are stored in the cloud, through mapping. A ring can be created exclusively for each service. That means that the container service can have its own ring, as can the object and account services. Each one of these three rings is present on each of the 15 storage servers. Because of Swift's flexibility property, new servers can be added to the cloud, in order to increase the available storage. Each new server added will contain the three rings. The ring also requires the definition of the number of replicas that will be used to store data. With data replication, if a server is unavailable, another can provide the requested data. Page 4 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

5 As illustrated in Figure 2, clients access the cloud using HTTPS. After that, the load balancer will transfer the users requests to an appropriate proxy. The proxy first authenticates the user and then verifies if the request can be fulfilled. If the user has the proper authentication, the proxy communicates with the storage servers to carry out the requests. 4. Validation of the design Figure 2: Architecture of the experimental phase of CNC Currently, there are 10 institutions participating in the experimental phase of the CNC Cloud Project, distributed all over Brazil: the Federal University of Juiz de Fora (UFJF), the Federal University of Santa Maria (UFSM),, the Federal University of Bahia (UFBA),, the Federal University of Cariri (UFCA), the Federal University of Paraná (UFPR), the University Telehealth Community Network (RUTE), the Point of Presence of the RNP network in the states of Pará (PoP-PA) and Santa Catarina (PoP-SC) and the Coordination of Improvement of Higher Education and Personnel of the Federal government (CAPES). Several activities have been carried out by each of these participants, following a methodology that proposed a series of use cases distributed over a 9 month test schedule. Each institution reports test results to the CNC project team on a monthly basis. At the beginning of these tests, the CNC project team guided the first contact of the Institutions users with the CNC Cloud. Test cases were defined to exercise the following activities: Federated authentication Page 5 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

6 Object and Directory List Directory creation Object upload Object deletion Web Client usability using the principal browsers Each test was carried out by around 20 users, who did not report any errors at this stage. Then, the CNC project team defined three test cases related to object sharing: Object sharing Directory sharing Temporary link sharing A total of 9 users performed these test cases. They did not report any errors during this second test stage. In addition, three tests related to Encrypted data storage were proposed: Data Storage and encryption Data decryption Sharing an encrypted file 11 users executed these test cases. All the cryptography tests showed errors due the crypto application. This application was blocked by security rules in some browsers. A final set of 3 test cases were defined related to document editing, as follows: Document creation Editing of shared documents Document upload for editing in the cloud We observed that 5 users reported errors in the execution of the tests related to document editing. In general, performance was the main issue reported, as well as the necessity to reopen documents to conclude editing. Others tests have been applied and will be reported by the CNC project team by the end of Once the tests are concluded, we expect good results for the performance and usability of the CNC Cloud. We obtained a 76% overall success rate in carrying out the tests. 5. Conclusion Data storage clouds are tools that are becoming more and more common in the daily lives of teachers and researchers. These users utilize the cloud to store and share data, such as class notes and scientific research results. The CNC Cloud project is being developed as a secure data storage service in the cloud, with a backend based on Openstack Swift, with its entire governance managed by RNP. For this purpose, the CNC Cloud infrastructure has its servers all over RNP s backbone distributed around Brazil with full ownership of those servers. CNC s frontend based on Owncloud seems to have been a good project decision, since the adoption of this technology clearly adds value to the CNC Cloud by its potential to offer a wide variety of (commercial like) functions to web, desktop and mobile clients. The CNC experimental service has demonstrated that it is possible to build up a community cloud with open-source technologies that allows a local control (independent of foreign Page 6 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

7 companies) over the main cloud assets, which are the users files. In the near future, RNP will be able to model a new service based on the CNC Cloud project results... References Armbrust, M. et al. (2009). Above the clouds: A Berkeley view of Cloud Computing Technical report. Reliable Adaptive Distributed Systems Laboratory. Berkeley, CA: University of California. Chadwick, D. W. (2009). Federated identity management. Foundations of Security Analysis and Design V, Berlin: Springer pp Foster, I., Zhao, Y., Raicu, I., Lu, S. (2008). Cloud computing and grid computing 360- degree compared. In: Grid Computing Environments Workshop, GCE 08 IEEE. pp Juve, G., Deelman, E., Vahi, K., Mehta, G., et al (2009). Scientific Workflow Applications on Amazon EC2.Workshop on Cloud-based Services and Applications in conjunction with 5th IEEE International Conference on e-science (e-science 2009), Oxford, UK. Khan, R.H., Ylitalo, J., Ahmed, A.S., (2011). OpenID Authentication As A Service in Openstack. 7th International Conference on Information Assurance and Security (IAS, Dezembro de 2011), pp Mahjoub, M., Mdhaffar A., et al (2011). A comparative study of the current Cloud Computing technologies and offers First International Symposium on Network Cloud Computing and Applications. IEEE. p. 131 a 134. OASIS (2005g). Security Assertion Markup Language (SAML) 2.0 Technical Overview.OASIS. Vaquero, L. M., Rodero-Merino, L., Caceres, J., and Lindner, M. (2009) A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 39(1) pp Wangham, M. S., Mello, E. R., Boger, D. S., Guerios, M., & Fraga, J. S.(2010). Gerenciamento de Identidades Federadas. Minicursos do Simposio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp Biographies Roberto Araujo is the coordinator of SE-CNC. He is a professor at Universidade Federal do Pará (Brazil). He holds a Ph.D. in informatics from Theoretical Computer Science group at TU-Darmstadt (Germany) and a Master's degree in computer science from Universidade Federal de Santa Catarina (Brazil). Computer security is his main research area. His topics of interest include secure voting, secure protocols, cryptography and cloud security. Carlos Eduardo da Silva has received a PhD in Computer Science from the University of Kent at Canterbury (2011). He is an Assistant Professor at the Metropole Digital Institute of the Federal University of Rio Grande do Norte (IMD/UFRN) in Brazil. His main research Page 7 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

8 interests are software engineering for self-adaptive software systems; cloud computing, security and identity management. Thomas Filipe is Bachelor in Computer Science from State University of Rio Grande do Norte and Science and Technology with emphasis in Web Development from Federal university of Rio Grande do Norte (UFRN). He s working on his master s degree in the Department of Informatics and Applied Mathematics (DIMAp), Center of Exact and Earth Sciences, UFRN. His main research topics are related to Cloud Computing systems and Access Control with focuses on Identity Federated Management. Tainá Medeiros studied at the University Center of João Pessoa (Brazil) where she graduated in Computer Science. She is a specialist in Information Security at Faculdade Idez (Brazil) and Master in Computer Science at Federal University of Rio Grande do Norte (Brazil). She s working at the Mauricio de Nassau College as a professor and works as a project manager of SE- CNC. Her main research interests are Software Engineering, Information Security, Artificial Intelligence and Digital Games. André Marins is a Research and Development Project Manager and leads RNP s Working Group Programme. Graduated in Computer Engineering at Pontifícia Universidade Católica do Rio de Janeiro PUC-Rio (1996), with MBA in Executive Management at IBMEC Business School (2001). Received his MSc. in Computer Science from PUC-Rio in Leaded high performance teams as IT Manager at Cadê (internet catalog acquired by Yahoo) ( ). Acted as Operation and IT Manager, Business Development Manager and IT Director at Starmedia ( ). As an IT Consultant at Vogal also managed document management projects ( ). Contributed as an IT researcher at TecGraf, PUC-Rio (2007). Michael Stanton is Director of Research and Development at RNP. After a PhD in mathematics at Cambridge University in 1971, he has taught at several universities in Brazil, since 1994 as professor of computer networking at the Universidade Federal Fluminense (UFF) in Niterói, Rio de Janeiro state. Between 1986 and 2003, he helped to kick-start research and education networking in Brazil, including the setting-up and running of both a regional network in Rio de Janeiro state (Rede-Rio) and RNP. He returned to RNP in 2001, with responsibility for R&D and RNP involvement in new networking and large-scale collaboration projects. Page 8 ISSN Proceedings and report of the 7th UbuntuNet Alliance annual conference, 2014,

Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service

Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service Thomas Diniz 1, Andre Castro de Felipe 1, Taina Medeiros 1, Carlos Eduardo da Silva 1, Roberto

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

Layered Mapping of Cloud Architecture with Grid Architecture

Layered Mapping of Cloud Architecture with Grid Architecture Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Structuring and implementing the Brazilian Academic Cloud. Strategy, modelling, challenges and services

Structuring and implementing the Brazilian Academic Cloud. Strategy, modelling, challenges and services Structuring and implementing the Brazilian Academic Cloud Strategy, modelling, challenges and services Paper s Authors José Luiz Ribeiro Filho Antônio Carlos Fernandes Nunes Ricardo Nobuyoshi dos Santos

More information

Implementing Mconf web conferencing at the South African National Research and Education Network

Implementing Mconf web conferencing at the South African National Research and Education Network Implementing Mconf web conferencing at the South African National Research and Education Network Kasandra ISAAC SANReN CA, CSIR Meraka Institute, Building 43, Block D, Meiring Naude Road, Pretoria, South

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014

More information

Is Cloud Computing the Solution for Brazilian Researchers? *

Is Cloud Computing the Solution for Brazilian Researchers? * Is Cloud Computing the Solution for Brazilian Researchers? * Daniel de Oliveira Federal University of Rio de Janeiro UFRJ Rio de Janeiro, Brazil Eduardo Ogasawara Federal University of Rio de Janeiro Federal

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,

More information

Geoprocessing in Hybrid Clouds

Geoprocessing in Hybrid Clouds Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;

More information

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas) Integral Federated Identity Management for Cloud Computing Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr. Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba,

More information

Cluster, Grid, Cloud Concepts

Cluster, Grid, Cloud Concepts Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,

More information

A STUDY ON CLOUD STORAGE

A STUDY ON CLOUD STORAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966

More information

FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito.

FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito. + FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO (serena.spinoso@polito.it) FULVIO VALENZA (fulvio.valenza@polito.it) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS

More information

Comparison of Open Source Cloud System for Small and Medium Sized Enterprises

Comparison of Open Source Cloud System for Small and Medium Sized Enterprises , pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College

More information

GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds

GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds Carlos Roberto Valêncio valencio@ibilce.unesp.br Diogo Lemos Guimarães diogolg06@gmail.com Andrielson Ferreira

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Introduction to OpenStack

Introduction to OpenStack Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa carlo.vallati@iet.unipi.it Cloud Computing - Definition Cloud Computing is a term coined to refer

More information

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing, and REST-based Architectures Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Mconf: collaboration proposal to form a global infrastructure for web conferencing based on open source

Mconf: collaboration proposal to form a global infrastructure for web conferencing based on open source Proceedings of the Asia-Pacific Advanced Network 2013 v. 35, p. 28-32. http://dx.doi.org/10.7125/apan.35.4 ISSN 2227-3026 Mconf: collaboration proposal to form a global infrastructure for web conferencing

More information

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION

INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

SWIFT Identity Management Model

SWIFT Identity Management Model ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK Abdulrahman H. Altalhi 1, Zailani Mohamed Sidek 2, Norjihan Abdul Ghani 3, Fazidah Othman 4 and Maged Abdelkhaleq

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange

A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange Elhadj Benkhelifa Faculty of Computing, Eng and Sciences University of Staffordshire Staffordshire, UK e-mail: e.benkhelifa@staffs.ac.uk

More information

A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools

A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools Márcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville,

More information

Introduction to Cloud : Cloud and Cloud Storage. Lecture 2. Dr. Dalit Naor IBM Haifa Research Storage Systems. Dalit Naor, IBM Haifa Research

Introduction to Cloud : Cloud and Cloud Storage. Lecture 2. Dr. Dalit Naor IBM Haifa Research Storage Systems. Dalit Naor, IBM Haifa Research Introduction to Cloud : Cloud and Cloud Storage Lecture 2 Dr. Dalit Naor IBM Haifa Research Storage Systems 1 Advanced Topics in Storage Systems for Big Data - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

Grid Computing vs Cloud

Grid Computing vs Cloud Chapter 3 Grid Computing vs Cloud Computing 3.1 Grid Computing Grid computing [8, 23, 25] is based on the philosophy of sharing information and power, which gives us access to another type of heterogeneous

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

A PERFORMANCE ANALYSIS of HADOOP CLUSTERS in OPENSTACK CLOUD and in REAL SYSTEM

A PERFORMANCE ANALYSIS of HADOOP CLUSTERS in OPENSTACK CLOUD and in REAL SYSTEM A PERFORMANCE ANALYSIS of HADOOP CLUSTERS in OPENSTACK CLOUD and in REAL SYSTEM Ramesh Maharjan and Manoj Shakya Department of Computer Science and Engineering Dhulikhel, Kavre, Nepal lazymesh@gmail.com,

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Will Cloud Computing Change Standards in IT- Service Management?

Will Cloud Computing Change Standards in IT- Service Management? Will Cloud Computing Change Standards in IT- Service Management? Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany marc.jansen@hs-ruhrwest.de

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;

More information

PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM

PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM Dimitris Karagiannis and Niksa Visic University of Vienna, Knowledge Engineering Research Group, Brünnerstr. 72, A-1210 Vienna, Austria {dk,

More information

RNP's ICP EDU Projects

RNP's ICP EDU Projects RNP's ICP EDU Projects PKI software and hardware for the Brazilian research community Ricardo Felipe Custódio UFSC Ricardo Dahab UNICAMP Jeroen van de Graaf UFMG RNP's ICP EDU Projects Joint effort UFSC

More information

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Cloud Computing in Medical Diagnosis for improving Health Care Environment Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,

More information

Demystifying Cloud Computing

Demystifying Cloud Computing Demystifying Cloud Computing Paulo Neto Faculdade de Engenharia da Universidade do Porto Rua Dr. Roberto Frias, s/n 4200-465 PORTO, Portugal pro10004@fe.up.pt Abstract. The Cloud computing emerges as a

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival

More information

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY 1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some

More information

E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING

E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING 1 DANNY MANONGGA, 2 WIRANTO HERRY UTOMO, 3 HENDRY 1 Information System Department, Satya Wacana Christian University 2 Information System

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

The Client Side of Cloud Computing

The Client Side of Cloud Computing Cloud Clients Service Look-Up Resumé Literature SE aus Informatik, SS 2009 26. Mai 2009 Cloud Clients Service Look-Up Resumé Literature 1 Cloud Clients Definition Hardware Clients Software Clients Software

More information

A Prototype Implementation of Database-as-a-Service for the Cloud

A Prototype Implementation of Database-as-a-Service for the Cloud A Prototype Implementation of Database-as-a-Service for the Cloud Kashif Laeeq Asst. Professor and PhD Scholar Dept. of Computer Science National University of Computer & Emerging Sciences, Karachi, Pakistan

More information

A Review of Cloud Computing Security Issues

A Review of Cloud Computing Security Issues , pp.215-222 http://dx.doi.org/10.14257/ijgdc.2015.8.5.21 A Review of Cloud Computing Security Issues 1 Manpreet Kaur and 2 Hardeep Singh 1 Research Fellow, Chandigarh Group of College, Landran Cutemani.shergill@gmail.com

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Cloud Computing and Attacks

Cloud Computing and Attacks Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large

More information

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

Prof. Luiz Fernando Bittencourt MO809L. Tópicos em Sistemas Distribuídos 1 semestre, 2015

Prof. Luiz Fernando Bittencourt MO809L. Tópicos em Sistemas Distribuídos 1 semestre, 2015 MO809L Tópicos em Sistemas Distribuídos 1 semestre, 2015 Introduction to Cloud Computing IT Challenges 70% of the budget to keep IT running, 30% available to create new value that needs to be inverted

More information

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Assessing the tests, homework & projects

Assessing the tests, homework & projects Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study of E-Learning

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach

WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany marc.jansen@hs-ruhrwest.de

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Single Sign-On: Reviewing the Field

Single Sign-On: Reviewing the Field Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

Towards Scalability for Federated Identity Systems for Cloud-Based Environments

Towards Scalability for Federated Identity Systems for Cloud-Based Environments Towards Scalability for Federated Identity Systems for Cloud-Based Environments André Albino Pereira João Bosco M. Sobral Carla M. Westphall Universidade Federal de Santa Catarina Programa de Pós-Graduação

More information

Cloud e-university services

Cloud e-university services ICT Innovations 2012 Web Proceedings ISSN 1857-7288 501 Cloud e-university services Kiril Kiroski, Marjan Gusev, Magdalena Kostoska, and Sasko Ristov University Ss Cyril and Methodius, Faculty of Computer

More information