Recent Advances in Cloud Security
|
|
|
- Abigayle Conley
- 10 years ago
- Views:
Transcription
1 2156 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER 2011 Recent Advances in Cloud Security Jiyi Wu 1,2 1.Key Lab of E-Business and Information Security, Hangzhou Normal University,Hangzhou,China 2.School of Computer Science and Technology, Zhejiang University,Hangzhou,China Qianli Shen *1,3, Tong Wang 1,4, Ji Zhu 1,3, Jianlin Zhang 1,3 3.Alibaba Business School, Hangzhou Normal University, Hangzhou, China 4.Information and Communication Engineering College, Harbin Engineering University, Harbin , China; Abstract Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for endusers. Although cloud computing industry promises tremendous prospects of market growth, for users of cloud services, cloud computing has a wide range of potential risks and safety issues. This article gives a quick introduction to cloud security. It covers the key technologies of cloud computing, security challenge and problem in cloud computing, recent advances in cloud security. Index Terms distributed computing, cloud computing, cloud security, survey rise to above 20%, exceeding to 56 billion dollars; yet, the investment institution, Merrill Lynch, believes that Cloud Computing will occupy 160 billion dollars of market shares in On the basis of different definitions and understandings of Cloud Computing in every company, the market scale and valuation of the market can be clarified. The emergence of Cloud Computing technology enables people to acquire applications and computing power through the network directly. The new mode will generate a great reform for the traditional IT industry, and Cloud Computing is I. INTRODUCTION When compared to the infinitely powerful Internet cloud, PCs seem like lightweight terminals allowing users to utilize the cloud. From this perspective, cloud computing seems like a return to the original mainframe paradigm [1]. As Fig.1 shows, a conceptual layer a cloud on the Internet hides all available resources (either hardware or software) and services, but it publishes a standard interface. As long as users can connect to the Internet, they have the entire Web as their power PC. Cloud computing thus refers to the techniques that enable and facilitate this scenario [2][3]. According to IDC, the global market size of Cloud Computing is expected to be increased from 16 billion dollars in 2008 to 42 billion U.S. dollars in 2012 [4], and the proportion of total investment is expected to rise from 4.2% to 8.5%, as shown in the Fig.2. Moreover, according to forecasts, in 2012, the input of Cloud Computing will take up 25% of the annual increase of IT investment, and 30% in According to the data analysis of the most authoritative IT research and consulting firm in the world, Gartner, it is believed that the market revenue of the Cloud Computing in 2009 will Manuscript received November 1, 2010; revised December 20, 2010; accepted December 30, Project supported by the National Natural Science Foundation of China (Grant No ) and the Scientific Research Program of Zhejiang Educational Department (Grant No ). * Corresponding author, Shen Qianli,[email protected] Figure 1. Six distinct phases of computing paradigm shift. progressing towards a developmental tendency. Although Cloud Computing industry promises tremendous prospects of market growth, for users of cloud services, Cloud Computing has a wide range of potential risks and safety issues. On the basis of objective analysis of the current security challenge problem in the field of Cloud Computing, the latest research process in the field of Cloud Security is concluded, indicating the major research direction of the field. The integration studies of Cloud Computing and trusted computing technology will become an important direction of cloud security. doi: /jcp
2 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER In the past two years, the cloud service providers have been frequently interrupted by various insecure events. On February 15, 2008, Amazon was blocked by the Web Services Downtime, affecting thousands of websites of EC2Cloud Computing and S3 cloud storage dependent on Amazon, including Twitter, SmugMug, 37Signals and AdaptiveBlue etc. On February 24, 2009, a global failure occurred in Google Gmail, and the service was interrupted for 4 hours. As the genesis of the breakdown was due to routine maintenance of the data center in Europe, the overload of another data center in Europe was intruded, the chain effect expanding to other data centers, ultimately resulting in a global disconnection. On March 7, 2009, files of a large number of users of Google were leaked. On March 15, 2009, Azure, the Cloud Computing platform of Microsoft, was halted from operation for about 22 hours, and Microsoft did not give out any detailed failure causes. On June 11, 2009, EC2 of Amazon was interrupted for hours because the lightening stroked the power equipment of the company's data center, leading to the disconnection of some AWS client services. On July 19, 2009, the Cloud Computing Web Services of Amazon was interrupted again. enhanced collaboration, integration, and analysis on a shared common platform. Depending on the type of provided capability, there are four scenarios where Clouds are used as showed in Fig.3. a) Infrastructure as a Service IPs manage a large set of computing resources, such as storing and processing capacity. Through virtualization, they are able to split, assign and dynamically resize these re-sources to build ad-hoc systems as demanded by customers, the SPs. They deploy the software stacks that run their ser-vices. This is the Infrastructure as a Service (IaaS) scenario. Figure 3. Cloud Computing service types with examples. Figure 2. IT cloud services spending prediction from IDC. While Cloud Computing greatly facilitating users and enterprises to use low-cost storage resources, software resources and computing resources, the greatest challenge or the existing problem comes from the security. II. WHAT S CLOUD COMPUTING A. Services in Cloud Computing Cloud computing is about moving services, computation or data for cost and business advantage off-site to an internal or external, location-transparent, centralized facility or contractor. By making data available in the cloud, it can be more easily and ubiquitously accessed, often at much lower cost, increasing its value by enabling opportunities for b) Platform as a Service Cloud systems can offer an additional abstraction level:instead of supplying a virtualized infrastructure, they canprovide the software platform where systems run on. The sizing of the hardware resources demanded by the execu-tion of the services is made in a transparent manner. Thisis denoted as Platform as a Service (PaaS). A well-known example is the Google Apps Engine. c) Storage as a Service Commonly known as Storage as a Service (SaaS), it facilitates cloud applications to scale beyond their limited servers. SaaS allows users to store their data at remote disks and access them anytime from any place. Cloud storage systems are expected to meet several rigorous requirements for maintaining users data and information, including high availability, reliability, performance, replication and data consistency; but because of the conflicting nature of these requirements, no one system implements all of them together. d) Software as a Service Finally, there are services of potential interest to a wide variety of users hosted in Cloud systems. This is an alter-native to locally run applications. An example of this is the online alternatives of typical office applications such as word processors. This scenario is called Software as a Service (SaaS).
3 2158 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER 2011 B. Advantage and Challenges a)advantage of cloud computing With everything, as has been said before, the devil is in the details. Certainly, there are more examples of the growing popularity of cloud computing and valid business reasons for its popularity. Here are five key benefits of using cloud computing and of applications that take advantage of storage in the cloud. Ease of management: The maintenance of the software, hardware and general infrastructure to support storage is drastically simplified by an application in the cloud. Applications that take advantage of storage in the cloud are often far easier to set up and maintain than deploying an equivalent service on premise. At the customer site, often all that is needed to manage your storage implementation is a simple web browser leaving the headaches to the service provider. Cost effectiveness: For total cost of ownership, cloud computing is a clear winner. Elimination of the costly systems and the people required to maintain them typically provides organizations with significant cost savings that more than offset the fees for cloud computing. The costs of being able to provide high levels of availability and the scalability an organization needs are also unmatched. The economies of scale achieved by data centers simply can t be matched by all but the very largest of organizations. Lower impact outages and upgrades: Typically cloud computing provides cost effective redundancies in storage hardware. This translates into uninterrupted service during a planned or unplanned outage. This is also true for hardware upgrades which for the end user will no longer be visible. Disaster preparedness: Off site storage isn t new. Keeping important data backed up off site has been the foundation of disaster recovery since the inception of the tape drive. Cloud computing services not only keep your data off premise, but they also make their living at ensuring that they have redundancy and systems in place for disaster recovery. Simplified planning: Cloud computing solutions free the IT manager from detailed capacity planning. Cloud-based solutions are flexible and provide storage as needed. This eliminates the need to over provision for storage that may be needed to meet b)challenges in the implementation However, with every type of cloud computing, there are challenges in the implementation (i.e. the devil is in the details). 1)Physical Security First, understand some things about the data center that is hosting the cloud where your data is stored: Is the data center physically secure? What about it's ability to withstand power outages? For how long? Are there multiple, independent (on different grids) electrical power paths? How are communications facilities enabled and where does the fiber enter the facility? How many communications providers have a POP (point of presence) at the facility? How is the data center certified (SAS 70 Type II)? World class data centers are expensive, and they are also well understood. What is the tier rating of the data center? (Tier IV is best). Make sure you do business with a cloud computing service provider who makes use of such facilities. 2) Data encryption Encryption is a key technology for data security. Understand data in motion and data at rest encryption. Remember, security can range from simple (easy to manage, low cost and quite frankly, not very secure) all the way to highly secure (very complex, expensive to manage, and quite limiting in terms of access). You and the provider of your Cloud computing solution have many decisions and options to consider. For example, do the Web services APIs that you use to access the cloud, either programmatically, or with clients written to those APIs, provide SSL encryption for access, this is generally considered to be a standard. Once the object arrives at the cloud, it is decrypted, and stored. Is there an option to encrypt it prior to storing? Do you want to worry about encryption before you upload the file for cloud computing or do you prefer that the cloud computing service automatically do it for you? These are options, understand your cloud computing solution and make your decisions based on desired levels of security. 3) Access Controls Authentication and identity management is more important than ever. And, it is not really all that different. What level of enforcement of password strength and change frequency does the service provider invoke? What is the recovery methodology for password and account name? How are passwords delivered to users upon a change? What about logs and the ability to audit access? This is not all that different from how you secure your internal systems and data, and it works the same way, if you use strong passwords, changed frequently, with typical IT security processes, you will protect that element of access. 4) Service Level Agreements (SLA) What kind of service commitment is your provider willing to offer you? Are they going to be up 99.9% of the time or 99.99% of the time? And how does that difference impact your ability to conduct your business? What is the backup strategy that your cloud provider uses, and does it include alternative site replication? Do they use one at all, or is backup something you have to provide for? Is there any SLA associated with backup, archive, or preservation of data. If your account becomes inactive (say you don't pay your bill), do they keep your
4 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER data? For how long? Once again, realize that there are different services, with different features, at different costs, and you get what you pay for. 5) Trusted Service Provider The trusted service provider is a critical link. Unlike your in-house IT department, you are now putting your trust in a 3rd party. You must feel confident that they will do what they say they will do. Can they demonstrate that the safeguards they claim are indeed delivered? What is their record? Do you have a successful business relationship with them already, and if not, do you know of others who do? Remember, are they in business to serve business, or is it simply another service that they offer, focused first on cost per gigabyte, versus service and support. This is where many IT service providers have made their living, providing world class service and support, along with effective, efficient, low cost infrastructure. As show in Fig. 4, the problem include security, control, performance, support, vendor lock-in, are concerned by users with cloud services. In the literature [5] conclusion, ten opportunities and ten problems of Cloud Computing are illustrated in Table 1. Among them, Availability of Service, Data Lock-In, Data Confidentiality and Auditability, Data Transfer Bottlenecks, Performance Unpredictability, Bugs in Large-Scale Distributed Systems, Reputation Fate Sharing and so on are correlated with confidentiality and reliability. The literature [2] also proposes that Cloud Computing should tackle with security, Data and Application Interoperability, Data and Application Portability, Governance and Management, Metering and Monitoring properly. Otherwise, its realization promise will be affected. According to the 2009 White Paper on China Cloud Computing Development [6] released by CCW Research, it is indicated that how the security, stability and reliability of Cloud Computing technology is will be one of the major considerations of Cloud Computing among domestic users. Cloud Computing experts, Patrick Goldsack et al of HP believe that: infrastructure services of Cloud Computing must be equipped with the privacy and security, service quality and performance assurance, flexibility, upward and downward scalability and fault resilience and other specific attributes so as to satisfy the enterprise-level demands. TABLE I. TEN OBSTACLES AND OPPORTUNITIES FOR CLOUD COMPUTING Figure4. Survey on concerns with cloud computing services. These challenges include: Security (always an issue and not necessarily a cloud computing specific issue) Data integrity (making sure the stored data is correct ) Power (since you have copies you will have extra storage which adds power) Replication time and costs (how fast can you replicate data since this can be important to data resiliency) Cost (how much extra money do you have to pay to buy the extra storage for copies) Reliability III. RECENT ADVANCES IN CLOUD SECURITY As studies of the field of Cloud Computing just began, there are few studies on Cloud Security with blurred fundamental concepts or definitions of the latest studies of Cloud Security. New findings in the field of Cloud Computing by RSA [7], Gartner [8], CSA [9], SUN [10], IBM [11] and other organizations have positive significances of the development of management and technology of Cloud Security. In its White Paper on Cloud Computing Security, RSA listed security metrics on aspects like supplier management, technical standards, data mobility, data confidentiality and privacy, visiting control, compliance, and security services, with the conclusion of three major categories of Cloud Computing security elements, and summarized Infrastructure,
5 2160 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER 2011 Identity, Information, three principles for securing the cloud. Kevin D.Bowers [7] et al in RSA laboratory also puts up with HAIL, the Cloud Storage model of high reliability and completeness with experiments of safety and efficiency. In July 2008, the international research institute, Gartner, issued a report named Teleworking in the Cloud: Security Risks and Remedies [8], also listed seven major threats in Cloud Computing, namely, the access for VIP users, review, data location, data isolation, data recovery, investigation support, and long-term survival. The report believes that Cloud Computing needs security risk assessment in fields like data integrity, data recovery and privacy. In addition, legal assessment on electronic retrieval, review and audition should be conducted. According to the White Paper on Emerging Security Technologies Prospects [12] by IBM in October 2008, it is estimated that during the next 2 to 5 years, 9 important tendencies and technologies will affect the security environment, among which, the tendency ranking the top should be to protect the security of virtualized environments. Specifically, the solution of three aspects of problems in Cloud Computing environment is in demand: ⑴ organizations (cloud service providers) should prepare the intensified individual management capabilities and separate the exclusive application, data and infrastructure for a user from other users through the separation strategies among several virtualization platforms; ⑵Just like the protection of physical environment, the integrity of virtual environments should be carefully managed and controlled. Traditional security features such as network monitoring and intrusion prevention should be applied to virtual environment; ⑶As virtualized resource serves as data image storage, possible contamination could emerge. Organizations should create image management functions so as to protect and maintain the resource definitions of powerful changes and processing batch management procedures. In April 2009, Cloud Security Association, which was officially established in RSA conference in San Francisco, US, issued a report of Security Guidance for Critical Areas of Focus in Cloud Computing [9], proposing Portability and Interoperability, Data Center Operations, Compliance and Audit, Incident Response, Notification, and Remediation, Application Security, Encryption and Key Management, Identity and Access Management and other remaining 15 security problems to be solved. The report comprehensively summed up all problems for Cloud Computing users and supplies, covering problems in aspects like legal, technological and administrative fields related to Cloud Computing. Cloud Security is a comprehensive concept and issue, probing into the security problems at all levels such as Environment, Process, Technique, Management, Service involved in the process of Cloud Computing. If the definition is given from a single perspective, such as the technical point of view, it will be undoubtedly one-sided, and undoubtedly incompetent to fundamentally reveal the nature of the problem. The goal of Cloud Security is to achieve Secure Cloud or Secure Cloud Computing, although in fact it is a direction without a terminal. At present, the cloud service providers are constrained in information security. Generally, stored data are encrypted with SSL and SSH and other security protocols to ensure data transmission security and user security access. Yet, when the user data is processed in the backend server RAM, the processing only can be implemented in plain text form, which provides possibility of attacking RAM data from leaks of the operation system. How to protect and separate the data in memory will be one of the important security needs for Cloud Computing. As shown in the Fig. 5, the literature [13] proposed the Secured Cloud, in which the user data of the public cloud are separated and stored from other organizations. Through the adoption of Secured & Isolated Cloud Area, the virtual machine resources are provided to ensure the intensive isolation. More importantly, the data is processed through the encrypting from the design and test of experts. Through the encrypted VPN channel, the communication between the Cloud service providers and the organizations is consistent with the log management and resource security management policies organized by users for security strategy design. In addition, it is also in conformity with demands in aspects like the Portability, Administrative Access, Testing, Transparency, and Compliance and so on. Digital Identity Management Services is an important measure of service access control of Cloud Computing platform in accordance with Identity Properties and Interaction Histories. The literature [14] has proposed a solution based on identity, AgZKPK encryption protocol and the semantic matching technology. In the literature, Mao Wen-Bo [15] et al of EMC have Figure 5. Secured Cloud. proposed the latest studies on Cloud Computing Security, which is expanded and decomposed from the front end (client-side, user-side) to the back-end (server-side, data centre), layer by layer, providing significant reference value. The design of Nuno Santos [16] et al puts up with the Trusted Cloud Computing Platform (TCCP), including a series of confidence-building nodes (N), trust coordinator (TC), non-trust cloud manager (CM) and external trust
6 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER entities (ETE), etc., as shown in Fig.6. TC is maintained by specific external trust entities (ETE). Through a black box environment, TCCP ensures the safety of the guest virtual machine, while allowing users to test and verify the security. Fiture 6. Trusted Cloud Computing Platform TCCP. Fiture 7. Daoli architecture In China, Chen Hai-Bo, Zang Bin-Yu et al [17] studied from the aspects of the security, maintainability, availability, reliability and so on of the Cloud Computing platform, namely, the research on Cloud Computing Platform Credibility Enhancement Technology with the groundbreaking significance to a great extent. The concept is close to the view of Professor Jin Hai [ 18] of Huazhong University of Science and Technology in his masterpiece, a safe and creditable virtual computing system. The literature [19] analyzes how virtual technologies improve the system security, and it is indicated that the virtualization has incalculable impact on the security enhancement on at least three aspects: ⑴it can easily isolate and shield unstable applications or those with security risks; ⑵support powerful sound crime analysis and highly effective disaster recovery solutions; ⑶virtualization also provides intrusion detection tools of lower costs. Fudan University, Wuhan University, Huazhong University of Science and Technology, Tsinghua University and EMC jointly launched the Daoli study project [20], specifically devoting in the global study coordination on the credibility and reliance under Cloud Computing environment with the integration of trusted computing technology and hardware virtualization security to achieve the verifiable security application isolation and acting codes for users. Thus, the protection of digital property of users in Cloud Computing and cloud storage services can be enhanced. Through the enhanced safety of systematical structure, trusted computing technology can improve the security of the computing platform. With the analysis of the development of the studies in this field, the integration of Cloud Computing and trusted computing technology for better solutions of the security problem in cloud services is becoming a feasible and important tendency. Fig.7 depicts the architecture. IV. CONCLUSION Cloud Computing declares a termination of devicecentric computing era, which is then replaced by the internet-centric computing model rather than winning praises by flubdub [21]. Cloud Computing enables users to outsource a part or all the computing processing task, and the information department will need no more professionals specifically for the maintenance and configuration of company servers, but to visit computing infrastructure via the Internet [22]. A large-scale Cloud Computing service provider can sufficiently meet the demands from various clients on more computing functions. Those small and medium enterprises without large data center can utilize the powerful processing function from Cloud Computing provider so as to effectively reduce IT costs [23][24]. As a new technology that is expected to cut costs greatly, Cloud Computing is increasingly recognized by many enterprises.
7 2162 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER 2011 From the perspective of academic research, problems to be addressed in the field of Cloud Security include: how to encrypt data storage and transmission; the replacement of research and algorithm of new encryption algorithm in Cloud Computing; authentication among cloud service application components; criteria and application of platform security evaluation of Cloud Computing; management of users authorized to access to the exotic cloud services and access manners; the security and access control of cloud service application program interfaces; a new generation of Cloud Computing Network Security Technology needed in Service Cloud Computing; the research and establishment of a complete Cloud Computing QoS system; and the integration research of Cloud Computing and trusted computing technology [25]. Under the mode of Cloud Computing, all of the business process will be completed on the server-side, and in the case that some problems occur in the server, the user application will be hampered from normal operation and data access [26]. The time to solve cloud breakdown is not long, yet sufficiently enough as a warning of Cloud Computing [27]. After all, the scale of cloud services is practically huge. In the event of any breakdown, the doubt of Cloud Computing Model among netizens may be triggered easily, undermining the confidence of users for cloud services [28] [29] [30]. Thus, if the weakness in reliability and safety of Cloud Computing cannot be properly solved, the popularity of Cloud Computing still requires more efforts. ACKNOWLEDGMENT The authors wish to thank anonymous reviewers for their valuable comments. Funding for this research was provided in part by the Scientific Research Program of Zhejiang Educational Department under Grant No , National Natural Science Foundation of China (Grant No ), Natural Science Foundation of Zhejiang pvovince (Grant No.Y ). REFERENCES [1] Jeffrey Voas, Jia Zhang, "Cloud Computing: New Wine or Just a New Bottle?," IT Professional, vol. 11, no. 2, pp , Mar./Apr [2] Luis M. Vaquero, Luis Rodero-Merino, Juan Caceres, Maik Lindner, "A Break in the Clouds: Towards a Cloud Definition",ACM SIGCOMM Computer Communication Review,39(1):50-55,2009. [3] Open Cloud Manifesto. Retrieved from [4] Neal Leavitt. "Is Cloud Computing Really Ready for Prime Time? ". IEEE Computer, 2009,(1): Retrieved from Now/homepage/mostread/MostRead-CO- CloudComputingPrimeTime.pdf. [5] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H.Katz, Andy Konwinski, Gunho Lee, David A.Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. "Above the Clouds: A Berkeley View of Cloud Computing", Retrieved from html [6] CCW Research White Paper on China Cloud Computing Development. Retrieved from [7] Kevin D.Bowers,Ari Juels, and Alina Oprea. HAIL: A High-Availability and Integrity Layer for Cloud Storage. Cryptology eprint Archive, Report 2008/489, Retrieved from [8] Gartner.Teleworking in the Cloud: Security Risks and Remedies, Retrieved from /teleworking_in_the_cloud_sec_ pdf,2009. [9] Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing. Retrieved from f,2010. [10] SUN. Introduction to Cloud Computing architecture White Paper (1st Edition),2009. [11] SUN. Introduction to Cloud Computing architecture White Paper (1st Edition),2009. Retrieved from [12] IBM. Prospects for new security technology.retrieved from [13] Clavister.Security in the Cloud Clavister White Paper. Retrieved from [14] Elisa Bertino,Federica Paci,Rodolfo Ferrini. Privacypreserving Digital Identity Management for Cloud Computing.Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009,32(1): [15] Mao Wen-Bo.Cloud computing security,2009. Retrieved from [16] Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues. Towards Trusted Cloud Computing Retrieved from [17] Haibo Chen. Improving the Dependability of Cloud Computing Systems, Fudan University PhD thesis,2009. [18] Jin Hai. Computing system virtualization: Principles and Applications, ChinaTsinghua University Press,2008. [19] Security: Alternative Reading advantages of virtualization,2007. Retrieved from l, [20] Daoli, Daoli Trusted Cloud Infrastructure,2009. Retrieved from [21] Wu Jiyi, Ping Lingdi, Pan Xuezeng. Cloud Computing: Concept and Platform [J]. Telecommunications Science,2009, (12): ( in Chinese) [22] Jiyi WU,Lingdi PING,Xiaoping GE,Ya Wang,Jianqing FU.Cloud Storage as the Infrastructure of Cloud Computing.in Proc. of ICICCI 2010,IEEE CS,2010. [23] Yunhong Gu and Robert L.Grossman. Sector and Sphere: the design and implementation of a high-performance data cloud. Philosophical Transactions of the Royal Society. A(2009)367: [24] Robert L Grossman,Yunhong Gu. Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere. In Proc. of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining,2008,
8 JOURNAL OF COMPUTERS, VOL. 6, NO. 10, OCTOBER [25] Daniel J. Abadi. Data Management in the Cloud: Limitations and Opportunities. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2009,32(1):3-12. [26] Peter Mell and Tim Grande. NIST. Retrieved from [27] S Lesem. Cloud Storage Strategy Retrieved from [28] Storage Networking Industry Association.Cloud Storage for Cloud Computing,Jun [29] Luiz Andre Barroso,Jeffrey Dean,Urs Holzle.Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2): [30] Robert L.Grossman, Yunhong Gu, Michael Sabala,Wanzhi Zhang. Compute and storage clouds using wide area high performance networks. Future Generation Computer Systems, 2009,25(2): Jiyi Wu was born in Zhejiang, China. He received the B.Eng. degree in 2002 and M.Eng. degree in 2005 both from Zhejiang University, Hangzhou China, all in computer science. He is currently a PhD candidate in the School of Computer Science and Technology, Zhejiang University, and associate professor of the Key Lab of E-Business and Information Security, Hangzhou Normal University. He is a senior membership of China Computer Federation (CCF). His main research interests include peer-to-peer network, cloud computing and virtualization, network information security. Qianli Shen is a lecturer at Alibaba Business School, Hangzhou Normal University. He received Master's degree in computer science and technology from Zhejiang University in His research interests include Cloud Computing, SaaS and information security. Shen Qianli was born in He received B.S degree from Zhejiang University in Tong Wang is an associate professor at Information and Communication Engineering College, Harbin Engineering University. He received Doctor's degree in Computer Application from Harbin Engineering University in His research interests include Cloud Computing, SaaS and information security. He was born in He received Master's degree from Harbin Engineering University in Ji Zhu is a teaching assistant at Alibaba Business School, Hangzhou Normal University. He received B.S degree in computer science and technology from Wenzhou University in His research interests include Cloud Computing, SaaS and information security. Jianlin Zhang is a professor at Alibaba Business School, Hangzhou Normal University. He received Master's degree in Computer Application from Zhejiang University in His research interests include Cloud Computing, SaaS and information security. Prof. Zhang was born in He received B.S degree from Zhejiang University of Technology in 1989.
Study on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts
Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Cloud Computing Security Issues and Access Control Solutions
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Cloud Computing Security Issues and Access Control Solutions Young-Gi Min 1), Hyo-Jin Shin 2), Young-Hwan Bang 3) Abstract Cloud computing
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Implementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Cloud Computing Paradigm Shift. Jan Šedivý
Cloud Computing Paradigm Shift Jan Šedivý Business expectations Improving business processes Reducing enterprise costs Increasing the use of information/analytics Improving enterprise workforce effectiveness
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Research on Storage Techniques in Cloud Computing
American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei
Li Sheng. [email protected]. Nowadays, with the booming development of network-based computing, more and more
36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng [email protected] Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
USE OF CLOUD COMPUTING BY SMALL AND MEDIUM ENTERPRISES
1 USE OF CLOUD COMPUTING BY SMALL AND MEDIUM ENTERPRISES Introduction Small and Medium Enterprises (SMEs) are the drivers of a nation s economy SMEs are leading the way for entering new global markets
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. [email protected]
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
What are Hosted Desktops?
Hosted Desktops An introduction to Hosted Desktops from Your Office Anywhere Hosted Desktops from Your Office Anywhere provide Flexibility, Reliability and Security and offer genuine cost savings against
Enable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Mutual Authentication Cloud Computing Platform based on TPM
Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
Survey On Cloud Computing
Survey On Cloud Computing 1,2 Heena I. Syed 1, Naghma A. Baig 2 Jawaharlal Darda Institute of Engineering & Technology, Yavatmal,M.S., India. 1 [email protected] 2 [email protected] Abstract
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Secure Bridge to the Cloud
Secure Bridge to the Cloud Jaushin Lee, Ph.D. September 2013 1 Table of Contents The promise for enterprise hybrid cloud computing... 3 Reality facing enterprise today... 3 Connecting the dots... 6 Secure
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
The Cloud Revolution - A Case Study
Joining The Cloud Revolution Table of Contents 1. What is Cloud Computing? a. Technology overview: Joining the b. Different approaches to the cloud i. Software as a Service ii. Platform as a Service iii.
Geoprocessing in Hybrid Clouds
Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.
ISACA Presentation. Cloud, Forensics and Cloud Forensics
ISACA Presentation Cloud, Forensics and Cloud Forensics Agenda What is the Cloud What is Forensics Challenges Cloud poses to Information Security and Forensic Investigations Using Cloud technologies to
Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1)
Roch Glitho, PhD Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1) Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Software
Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud
Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud Index Index... 2 Overview... 3 What is cloud computing?... 3 The benefit to businesses... 4 The downsides of public
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Cloud Computing: Technical Challenges and CloudSim Functionalities
Cloud Computing: Technical Challenges and CloudSim Functionalities Firas D. Ahmed 1, Amer Al Nejam 2 1 Universiti Tenaga Nasional, College of Information Technology, Jalan IKRAM-UNITEN, 43000 Kajang, Malaysia
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
The Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER
The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY............................................... 1 BUSINESS CHALLENGE: MANAGING CHANGE.................................
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism
A Proposed Secure Framework for Safe Data Transmission in Private Cloud
A Proposed Secure Framework for Safe Data Transmission in Private Cloud Rohit Maheshwari, Sunil Pathak Abstract Cloud security is the current discussion in the IT world. In the cloud, the data is transferred
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT
Analysis of Privacy Challenges and Security Concerns in Cloud Computing Varun Shukla Department of EC, PSIT Abstract Cloud computing is a method to enhance the capacity dynamically without investing in
A Web Base Information System Using Cloud Computing
A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Logentries Insights: The State of Log Management & Analytics for AWS
Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Introduction to Cloud Computing
Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
