Cloud Computing Security: Issues and Concerns

Size: px
Start display at page:

Download "Cloud Computing Security: Issues and Concerns"

Transcription

1 Cloud Computing Security: Issues and Concerns Naveen Dogra 1, Harpreet Kaur 2 1,2 Assistant Professor, Panjab University SSGRC, Hoshiarpur, Punjab Abstract Cloud Computing is gaining the attention of todays users and businesses. Network-based Cloud Computing is rapidly expanding as an alternative to conventional office-based computing. Cloud Computing provides suitable on-demand network access to a shared pool of computing resources. Several trends are opening up the era of Cloud Computing, which is the use of computer technology, used to make storage of huge amounts of data and information easier for organizations. Maintaining own servers to store all the information is quite expensive for individual and organizations. Cloud Computing allows to store and maintain data on remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data can then be accessed throughout the globe. But as more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about how safe an environment is. In this paper general charateristics if Clouds, benefits, security issues and requirements in the Cloud are discussed. Keywords Cloud Computing, security, privacy I. INTRODUCTION Cloud Computing allows computer users to have full access to applications, to software development and deployment environments, and to computing infrastructure assets such as data storage and processing. Cloud Computing is a large-scale parallel and distributed computing system. It consists of a collection of interconnected and virtualized computing resources that are managed to be one or more unified computing resources [1]. Through Cloud Computing services are delivered on demand to the end user over high speed internet. The main goal is to provide users with more flexible services in a transparent manner, cheaper, scalable, highly available and powerful computing resources [2]. Clouds aim to power the next generation data centers by designing them as a network of virtual services (hardware, database, userinterface) so that users are able to access and deploy applications from anywhere in the world on demand at competitive costs depending on users Quality of Service (QoS) requirements [2]. Cloud Computing means different things to different people. As a result, there are several definitions and proposals [4]. Vaquero et al. [4] have proposed a definition that is centered on scalability, payper-use utility model and virtualization. According to Garner, Cloud Computing is a style of computing where service is provided across the Internet using different models and layers of abstraction. Armbrust et al. [5], [6] observe that Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and system software in the data centers that provide those services. This definition captures the real essence of this new trend, where both software applications and hardware infrastructures are moved from private environment to third parties data centers and made accessible through the Internet. Certainly, the lack of a standard definition of Cloud Computing has generated not only market hypes, but also a fair amount of confusion. For this reason, recently there has been work on standardizing the definition of Cloud Computing. We adopt the definition of Cloud Computing provided by The National Institute of Standards and Technology (NIST) [7], as it covers, in our opinion, all the essential aspects of Cloud Computing [8]. NIST definition of Cloud Computing: Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [7]. Cloud promises huge cost benefits, quickness and scalability to the business. All business data and software are stored on servers at a remote location referred to as Data centers. Data center environment allows enterprises to run applications faster, with easier manageability and less maintenance effort, and more rapidly scale resources (e.g. servers, storage, and networking) to meet changing business needs [11]. A data center in Cloud environment holds information that end-users would more traditionally have stored on their computers. This raise concerns regarding user privacy protection because users must outsource their data [10]. The movement of data to centralized services could affect the privacy and security of users interactions with the files stored in Cloud storage space. Moving data into the Cloud offers great convenience to users since they don t have to care about the complexities of direct hardware management. While these internet- based online services do provide huge amounts of storage space and customizable computing resources, this computing platform shift, however, eliminates the responsibility of local machines for data maintenance. 331

2 Essential Characteristics: Following are the essential characteristics of Cloud community [7, 9, 15]: On-demand self-service: A consumer has an access to computing capabilities, such as server time and network storage automatically without requiring human interaction with the service s providers. Broad network access: The resources are available over the network and can be for promote use by heterogeneous client platforms. Resource pooling: The computing resources are pooled together to serve multiple consumers using different models like a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. The customer has no control or knowledge of the exact location of the resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth. Rapid elasticity: Resources can be rapidly and elastically provisioned, in some cases automatically, to scale rapidly outward and inward corresponding with demand. To the consumer, the resources available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. Measured Service: Cloud systems automatically control and optimize resource use by applying some level of abstraction as appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the service. Service Models: In addition to the above five essential characteristics, the Cloud have used the following three service models [7],[9],[15]: Cloud Software as a Service (SaaS). The resources provided to the consumer are to use the provider s applications running on a Cloud infrastructure. Cloud consumers release their applications on a hosting environment, which can be accessed through networks from various clients (e.g. web browser, PDA, etc.) by application users. The consumer does not manage or control the Cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, because of the limited user-specific application configuration settings. The common service providers of SaaS are Salesforce and gmail. Cloud Platform as a Service (PaaS). The resources provided to the consumer are to organize the Cloud infrastructure consumer applications created using programming languages and tools supported by the provider. The consumer does not manage or control the Cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and application hosting environment configurations. The common service providers of PaaS are Force.com and Google App Engine. Cloud Infrastructure as a Service (IaaS). The resources assigned to the consumer are to provide provision for processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run random software, which can include operating systems and applications. The consumer may not need to manage or control this Cloud infrastructure but has control over operating systems, storage, deployed applications; and possibly limited control of select networking components. Cloud consumers directly use IT infrastructures provided in the IaaS Cloud. Deployment Models: Cloud community propose the following three deployment model: [7],[9],[15] Private cloud: The Cloud infrastructure is exclusively for the use of a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. In this infrastructure organization always require full control over critical activities that reside over the remote servers. Example of Private Cloud service providers are cloud.com, Eucalyptus and IBM. Public cloud: The Cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the Cloud provider. Example of Public Cloud service providers are Amazon ECL, IBM, Rackspace and Verizon. Hybrid cloud: The Cloud infrastructure is a composition of two or more distinct Cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., Cloud bursting for load balancing between clouds)." 332

3 II. CLOUD COMPUTING ARCHITECTURE This section describes the architectural, business and various operation models of Cloud Computing. A Layered Model of Cloud Computing The Cloud Computing architecture can be divided into 4 layers [8]: the hardware/data center layer, the infrastructure layer, the platform layer and the application layer, as shown in Figure 1. We describe each of them in detail: The : This layer is implemented in the data centres and used for managing the physical resources of the Cloud, including physical servers, routers, switches, power and cooling systems. A data center has thousands of servers that are interconnected through switches, routers or other fabrics and are organized in racks. Hardware layer deals with issues like configuring hardware, fault tolerance, traffic management, power and cooling resource management [8]. Applications Platforms Infrastructure LaLayer e Layer Figure 1: Cloud Computing Architecture [8] The Infrastructure Layer: This layer is also known as the virtualization layer, the infrastructure layer creates a pool of storage and computing resources by partitioning the physical resources using virtualization technologies such as Xen, KVM and VMware. Issues like dynamic resource mangement are dealt through virtualization technologies [8]. The Platform Layer: Above infrastructure layer, the platform layer exits and it consists of operating systems and application frameworks. The main aim of platform layer is to reduce the burden of deploying applications directly into VM containers. For example, Google App Engine operates at the platform layer to provide API support for implementing storage, database and business logic of typical web applications [8]. The Application Layer: At the highest level of the hierarchy, their exit an application layer. Different from traditional applications, Cloud applications can leverage the automatic-scaling feature to achieve better performance, availability and lower operating cost. Compared to traditional service hosting environments such as dedicated server farms, the architecture of Cloud Computing is more modular. Each layer is loosely coupled with the layers above and below, allowing each layer to evolve separately. [8]. III. CONTROL OF RESOURCES IN A CLOUD It is sometimes affirmed that when compared to traditional on premises computing, Cloud Computing requires consumers to give up two important capabilities to their providers: [7,9] Control: it is the responsibility of the provider to decide, who and what is allowed to access consumer data and programs, and who has the ability to perform actions like erasing data or disconnecting a network and also that what type of actions have been taken that would not challenge the consumer's intent. Visibility: the ability to monitor, with high confidence, the status of a consumer's data and programs and how consumer data and programs are being accessed by others. The extent to which consumers may need to surrender control or visibility depends on a number of factors including physical ownership and the ability to configure protective access boundary mechanisms around a consumer s computing resources. IV. SECURITY Providers generally state that they are not responsible for the impacts of security breaches or for security, i.e., unauthorized modification or disclosure of consumer data, or service interruptions caused by malicious activity. Data processed in a public Cloud and applications running in a public Cloud may experience different security exposures. Service agreements are explicit about placing security risks on consumers. In some cases, providers promise to use best efforts to protect consumer data, but all of the providers surveyed disclaim security responsibility for data breach, data loss, or service interruptions by limiting remedies to service credits for failure to meet availability promises. Information Security Information security [9] means protecting the confidentiality and integrity of data and ensuring data availability. An organization that owns and runs its IT operations will normally take the following types of measures for its data security: 333

4 Organizational/Administrative controls specifying who can perform data related operations such as creation, access, disclosure, transport, and destruction. Physical Controls for protecting storage media and the facilities housing storage devices. Technical Controls for Identity and Access Management (IAM), encryption of data at rest and in transit, and other data audit-handling requirements for complying with regulatory requirements. When an organization subscribe to a cloud, all the data generated and processed will physically resides with the owner of the cloud and operated by a provider. The fundamental issue is whether a consumer can obtain a guarantee that a provider is implementing the same or equivalent controls that the consumer would have implemented. Data that a consumer wants to move to a cloud may need specific levels of audit logging, alert generation, activity reporting, and data retention. Data Privacy Privacy [9] addresses the confidentiality of data for specific entities, such as consumers or others whose information is processed in a system. Privacy carries legal and liability concerns, and should be viewed not only as a technical challenge but also as a legal and ethical concern. Protecting privacy in any computing system is a technical challenge; in a Cloud, setting this challenge is complicated by the distributed nature of clouds and the possible lack of consumer awareness over where data is stored and who has or can have access. System Integrity Clouds require protection against intentional subversion of the functionality of a cloud. Within a Cloud there are stakeholders: consumers, providers, and a variety of administrators. The ability to partition access rights to each of these groups, while keeping malicious attacks at bay, is a key attribute of maintaining Cloud integrity. In a Cloud setting, any lack of visibility into a cloud's mechanisms makes it more difficult for consumers to check the integrity of cloud-hosted applications.[9] V. SECURITY ISSUES Cloud Computing presents specific challenges to privacy and security. When using cloud-based services, one is entrusting the third party for their data storage and security. Cloud-sourcing involves the use of many services, and many Cloud based services provide services to each other, and thus cloud-based products may have to share your information with third parties if they are involved in processing or transferring of your information. [22] Each cloud-based service has its own terms and conditions, or service level agreement, that the user agrees to before signing to a Cloud, and these services agreements are often updated. There must be proper awareness about privacy and security issues around Cloud Computing. People need to be aware of terms and conditions of the Cloud service providers as well as keep up with updates. The information stored by Cloud services is subject to the legal, regulatory and policy environments of the country.as more and more information is stored in the Cloud these issues become significant, and Cloud Computing will continue to offer challenges to national policy and regulation as well as to internet governance, on how best to resolve privacy and security issues. Security concerns have been raised due to the new computing model introduced by Cloud Computing, which is characterized by off-premises computing, lost control of IT infrastructure, service oriented computing, and virtualization, and so on. Security concerns from users can be briefly summarized as follows [14]: System failure and Data availability: When keeping data at remote systems owned by others, data owners may suffer from system failures of the service provider. Data error: Client data should be error free on the cloud. The data is stored on the Cloud which is remote to the client. If the correct storage strategy is not used data might not be stored correctly on the storage server of the Cloud. Data Migratibility: Users that adopt Cloud Computing may want their data to be migrated to other Clouds but this procedure is subject to the risk that their data cannot be migrated to other clouds. Long-term availability: Consumer must be sure that data must be available every time even if the Cloud Computing provider will get acquired and swallowed up by a larger company. Data location: Client has no idea of the whereabouts of data or exactly where the data is hosted. In fact, one might not even know what country it will be stored in. Data segregation: Client has to be sure that encryption must be available at all stages, and that these encryption schemes were designed and tested by experienced professionals. 334

5 Data Recovery: Clouds provides the data recovery to some extent in case of a disaster. Any offering that does not replicate the data and application infrastructure across multiple sites is vulnerable to a total failure. VI. CONCLUSION The Cloud provides many options for the everyday computer user as well as large and small businesses. It opens up the world of computing to a broader range of uses and increases the ease of use by giving access through any internet connection. With this increased relieve, there comes some drawbacks also. The end user has less control over the information, knowledge and software s that are being used. Clouds are more subjected to the data theft, malicious access, and unsecured internet access. Though the Cloud Computing had many security breaches, privacy and integrity concerns but still Cloud Computing environment provides great deal of advantages and convenience to the end users by providing the services like Software as a Service which reduces the licencing cost of the software, infrastructure as a Service which reduces the infrastructual cost of company. Efforts have been made to enforce confidentiality, integrity and privacy of data. This is an emerging computing environment, but before shifting to Cloud one has to consider the options in terms of what type of Cloud will be best according to the needs, what type of provider will be most useful, and what the reputation and responsibilities of the providers. REFERENCES [1 ] Mohamed- K Hussein and Mohamed-H Mousa, A Light-weight Data Replication for Cloud Data Centers Environment, International Journal of Engineering and Innovative Technology Vol. 1, no. 6, pp , [2 ] Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I, Cloud computing and Emerging IT platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems, vol.25, no.6, pp , [3 ] Parkhill D, The Challenge of the Computer Utility, Addison- Wesley, Reading, [4 ] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A break in the clouds: towards a cloud definition, SIGCOMM Computer Communication Review, vol. 39, pp , [5 ] M. Armbrust, A. Fox, R. Griffith, A.D.Joseph, R.Katz, A.Konwinski, G.Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing, Communications of the ACM, vol. 53, no. 4, pp , [6 ] Suraj Pandey, Scheduling and Management of Data Intensive Application Workflows in Grid and Cloud Computing Environments, Ph.D. dissertation, The University of Melbourne, Australia, [7 ] Peter Mell and Tim Grance, The NIST Definition of Cloud Computing, National Institute of Science and Technology. Retrieved 24 July [8 ] Q. Zhang, L. Cheng, and R. Boutaba. Cloud computing, State ofthe-art and Research Challenges, Journal of Internet Services and Applications, Springer London, vol. 1, no. 1, pp.7 18, [9 ] Lee Badger, Tim Grance, Robert Patt-Corner, Jeff Voas Cloud Computing Synopsis and Recommendations NIST Special Publication [10 ] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou Ensuring Data Storage Security in Cloud Computing in Proc. of IWQoS 09, July 2009, pp [11 ] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE transactions on Services Computing, 06 May [12 ] Venkatesa Kumar V, Poornima G Ensuring Data Integrity in Cloud Computing Journal of Computer Applications ISSN: , Volume-5, Issue EICA2012-4, February 10, 2012 [13 ] K.Valli Madhavi, R.Tamilkodi, R.BalaDinakar, Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System [14 ] Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma, A proposed Solution: Data Availability and Error Correction in Cloud Computing International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 [15 ] Tharam Dillon, Chen Wu and Elizabeth Chang. Cloud Computing: Issues and Challenges th IEEE International Conference on Advanced Information Networking and Applications. [16 ] Deepanchakaravarthi Purushothaman and Dr.Sunitha Abburu, An Approach for Data Storage Security in Cloud Computing IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, March 2012 [17 ] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing 14th European Symposium on Research in Computer Security (ESORICS 09) [18 ] B.AmarNadh Reddy, P.Raja Sekhar Reddy, Effective Data Distribution Techniques for Multi-Cloud Storage in Cloud Computing International Journal of Engineering Research and Applications (IJERA) ISSN: Vol. 2, Issue 5, September- October 2012, pp [19 ] Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control CCSW 09, November 13, 2009, Chicago, Illinois, USA. [20 ] Ian Foster, Yong Zhao, Ioan Raicu, Shiyong Lu, Cloud Computing and Grid Computing 360-Degree Compared [21 ] Jayant Baliga, Robert W. A. Ayre, Kerry Hinton, and Rodney S. Tucker, Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport 2010 IEEE 99, No. 1, January 2011 Proceedings of the IEEE [22 ] Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, 01037/12/EN WP 196. [23 ] Renee Berry and Matthew Reisman, Policy Challenges of Cross- Border Cloud Computing, U.S. International Trade Commission, Journal of international commerce and economics. [24 ] Ning Cao, Secure and Reliable Data Outsourcing in Cloud Computing, A Dissertation, July 2012 [25 ] Alexa Huth and James Cebula, The Basics of Cloud Computing, 2011 Carnegie Mellon University. Produced for US-CERT, a government organization. 335

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

A Survey on Cloud Computing Security, Challenges and Threats

A Survey on Cloud Computing Security, Challenges and Threats A Survey on Cloud Computing Security, Challenges and Threats Rajnish Choubey 1, Rajshree Dubey 2, Joy Bhattacharjee 3 1 Assistant Professor, Dept. of CSE, TCT, Bhopal, India 2. Assistant Professor, Dept.

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model

More information

The NIST Definition of Cloud Computing

The NIST Definition of Cloud Computing Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST

More information

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University

More information

The NIST Definition of Cloud Computing (Draft)

The NIST Definition of Cloud Computing (Draft) Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication

More information

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government October 4, 2009 Prepared By: Robert Woolley and David Fletcher Introduction Provisioning Information Technology (IT) services to enterprises

More information

Customer Security Issues in Cloud Computing

Customer Security Issues in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:

More information

Security Aspects of Cloud Computing

Security Aspects of Cloud Computing Security Aspects of Cloud Computing Kunal Chadha Scholar, CSE Department University of Southern California, USA Anvita Bajpai X-Scholar, CSE Department Marist College, NY, USA ABSTRACT Cloud Computing

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Understanding the Cloud: Towards a Suitable Cloud Service

Understanding the Cloud: Towards a Suitable Cloud Service International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Understanding the Cloud: Towards a Suitable Cloud Service Huda S. Alrowaihi Computer Information Systems,

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing

More information

Secured Storage of Outsourced Data in Cloud Computing

Secured Storage of Outsourced Data in Cloud Computing Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated

More information

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Enhancing Operational Capacities and Capabilities through Cloud Technologies Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

IS PRIVATE CLOUD A UNICORN?

IS PRIVATE CLOUD A UNICORN? IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there

More information

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

A Survey Paper: Cloud Computing and Virtual Machine Migration

A Survey Paper: Cloud Computing and Virtual Machine Migration 577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one

More information

Kent State University s Cloud Strategy

Kent State University s Cloud Strategy Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits

More information

Security Issues On Cloud Computing

Security Issues On Cloud Computing Security Issues On Cloud Computing Pratibha Tripathi #1, Mohammad Suaib #2 1 M.Tech(CSE), Second year 2 Research Guide # Department of Computer Science and Engineering Abstract Integral University, Lucknow

More information

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University.

Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University. Information Auditing and Governance of Cloud Computing IT Capstone 4444 - Spring 2013 Sona Aryal Laura Webb Cameron University P a g e 1 P a g e 2 Table of Contents Abstract... 3 Introduction... 3 Previous

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Analysis and Strategy for the Performance Testing in Cloud Computing

Analysis and Strategy for the Performance Testing in Cloud Computing Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 10 Version 1.0 July 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

Cloud Computing For Distributed University Campus: A Prototype Suggestion

Cloud Computing For Distributed University Campus: A Prototype Suggestion Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert mferkoc@yildiz.edu.tr, sbkert@yildiz.edu.tr Yildiz Technical University (Turkey) Abstract

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing: Comparison with Previous Technique and Research Challenges Nimisha Gupta Bharti Chauhan Tanvi Anand Charul Dewan Assistant Professor(IT), ABSTRACT Cloud computing has recently emerged

More information

From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

From Grid Computing to Cloud Computing & Security Issues in Cloud Computing From Grid Computing to Cloud Computing & Security Issues in Cloud Computing Rajendra Kumar Dwivedi Assistant Professor (Department of CSE), M.M.M. Engineering College, Gorakhpur (UP), India E-mail: rajendra_bhilai@yahoo.com

More information

Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

Enhanced Survey and Proposal to secure the data in Cloud Computing Environment Enhanced Survey and Proposal to secure the data in Cloud Computing Environment MR.S.SUBBIAH, Research Scholar PRIST University Thanjvur, Tamil Nadu. subbussp2007@gmail.com DR.S.SELVA MUTHUKUMARAN, Director,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI, Matunga, Mumbai, India, E-mail:harshagzb89@gmail.com. Abstract

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Addressing Data Security Challenges in the Cloud

Addressing Data Security Challenges in the Cloud Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud

More information

CLOUD COMPUTING AND ITS SECURITY ASPECTS

CLOUD COMPUTING AND ITS SECURITY ASPECTS CLOUD COMPUTING AND ITS SECURITY ASPECTS Subhash Basishtha 1, Saptarshi Boruah 2 1 Department of Information Technology, Assam University, Silchar-788011, India 2 Department of Information Technology,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Cloud Template, a Big Data Solution

Cloud Template, a Big Data Solution Template, a Big Data Solution Mehdi Bahrami Electronic Engineering and Computer Science Department University of California, Merced, USA MBahrami@UCMerced.edu Abstract. Today cloud computing has become

More information

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing

How To Compare Cloud Computing To Cloud Platforms And Cloud Computing Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms

More information

Capability Paper. Today, aerospace and defense (A&D) companies find

Capability Paper. Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Clearing The Clouds On Cloud Computing: Survey Paper

Clearing The Clouds On Cloud Computing: Survey Paper Clearing The Clouds On Cloud Computing: Survey Paper PS Yoganandani 1, Rahul Johari 2, Kunal Krishna 3, Rahul Kumar 4, Sumit Maurya 5 1,2,3,4,5 Guru Gobind Singh Indraparasta University, New Delhi Abstract

More information

Cloud computing security using encryption technique

Cloud computing security using encryption technique Cloud computing security using encryption technique Geethu Thomas Prem Jose V P.Afsar Abstract Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. The Cloud computing

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

NATO s Journey to the Cloud Vision and Progress

NATO s Journey to the Cloud Vision and Progress NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,

More information

A Review of Cloud Computing Security Issues

A Review of Cloud Computing Security Issues , pp.215-222 http://dx.doi.org/10.14257/ijgdc.2015.8.5.21 A Review of Cloud Computing Security Issues 1 Manpreet Kaur and 2 Hardeep Singh 1 Research Fellow, Chandigarh Group of College, Landran Cutemani.shergill@gmail.com

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Implementing & Developing Cloud Computing on Web Application

Implementing & Developing Cloud Computing on Web Application Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography

Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,

More information

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable

More information

Dynamic Round Robin for Load Balancing in a Cloud Computing

Dynamic Round Robin for Load Balancing in a Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.274

More information

The Trend and Challenges of Cloud Computing: A Literature Review

The Trend and Challenges of Cloud Computing: A Literature Review The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information