Data Storage and Synchronization in Private Cloud
|
|
|
- Edmund Stephens
- 10 years ago
- Views:
Transcription
1 Data Storage and Synchronization in Private Cloud D. Hodanić, N.Vrkić and M. Tomić University of Rijeka, Faculty of Engineering, Department of Computer Engineering, Rijeka, Croatia {dhodanic, nvrkic, Abstract - Usage of cloud systems for data storage has many advantages over the traditional approaches. It is already widely used and its popularity is still fast-growing. The systems must be implemented and maintained in a way that not only satisfies the performance and resource availability requirements, but also fully addresses the questions of security, privacy and data ownership. However, concerns related to those questions very often lead to considerations of a private cloud implementation. In this paper, we explore a private cloud implementation suitable for small to medium businesses. We introduce main types of cloud computing as basic service models and analyze private cloud systems features. Advantages and disadvantages in comparison to public cloud services are considered. Implementation of private cloud solutions in a lab environment allowed us to examine the ease of the setup and maintenance as well as the usability of the chosen solutions and their applicability for the target user group. I. INTRODUCTION Cloud technologies have infiltrated society in many aspects. Our culture is currently built around mobile devices, social media, cloud platforms, intelligent systems and many more. There is a lot of personal and business information that has to be stored. Cloud storage and synchronization are highly popular for personal use. In contrast, organizations are still cautious with moving their businesses into the cloud. Privacy and security are the main concerns when considering cloud solutions. Most of the popular cloud services offer public cloud service model. Public cloud platforms opened the cloud concept to personal users. There is no doubt that these systems earned their popularity, but for some user groups more private solutions are potentially a more viable and acceptable option. Although cloud platforms extended possibilities in terms of storage and synchronization for organizations, they also produced some uncertainties. With enterprises and cloud services, trust issues were bound to come up. Trust is depicted as a complex factor formed of control over assets, data ownership, failure prevention and security. Khan et al. showed in [1] that building trust in cloud services comes with time, good performances, security, more client control and transparency. Therefore, private clouds found their way into many organizations and application areas where trust is of great concern. For instance, Doelitzscher et al. in [2] presented a case for building a private cloud for collaboration and e-learning services in HFU University. Architecture and software aspects were analyzed in detail, with conclusions about private cloud benefits at the university and its IT department. A more general comparison of several cloud computing platforms has been given in [3] to provide better understanding and useful details for choosing the best cloud solution given a specific case. The authors focused on private and hybrid clouds, namely OpenNebula and Nimbus and considered OpenNebula solution to be suitable for building a highly scalable cloud computing environment. In [4], the Eucalyptus was considered in details. Eucalyptus is an open source private and hybrid cloud software representative, suitable for the use in enterprises. It is compatible with Amazon Web Services (AWS) cloud interface, allowing interaction between a private and a public cloud. Atefi et al. presented in [5] the use of open source private cloud for digital forensics. Seafile was chosen due to its advanced features for preserving privacy, file syncing, and collaboration. In a prototype research from Mościcki et al. [6], a private cloud solution for internal use by the CERN employees has been analyzed in depth, as an alternative to the public cloud services. The authors chose owncloud as a viable platform for an open source private cloud solution for file sharing and synchronization on a very large scale. OwnCloud competitors, such as Pydio, Seafile, SparkleShare and Syncany were discarded because of feature incompleteness, usability issues or failing to support necessary file formats. They found that only owncloud satisfied most of their demands for building an open source cloud solution which can compare well to commercial solutions. Private cloud systems are highly adjustable to user s needs and offer great flexibility in terms of the number of active users and feature implementations. There are several solutions, but also many different concepts for custom usage within organizations. In this paper, we explore how private cloud solutions may benefit small to medium businesses (SMB). A deployment of an open source private cloud system with software solutions such as owncloud, provides business users with internal control of privacy and sole data ownership. We also consider questions of security, scalability and cost. MIPRO 2015/CTI 541
2 Figure 1. Basic cloud computing service models II. CLOUD COMPUTING CONCEPTS AND CLOUD STORAGE MODELS A. Definition of the cloud There is more than one definition of cloud computing, but most of them have a similar meaning using computer resources on demand. This is a model for delivering information technology services where resources are retrieved from the Internet using web-based tools. Applications can communicate with servers where all data and software packages are stored. Cloud computing model allows access to information as long as a client s device has access to the web. Companies may find that the cloud computing allows them to reduce the cost of information management, since they are not required to use their own infrastructure, but instead lease it from service providers [7]. B. Cloud service models There are three basic cloud computing service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), as shown in Fig. 1. Infrastructure as a Service (IaaS) is a service model where cloud computing service providers share their storage, network, and other computing resources with their clients. Clients are able to run their own software. A user does not operate or control fundamental physical infrastructure of a cloud but has control over operating systems, storage, deployed applications, and possibly limited control of selected networking components. Service providers give their users access to multiple virtual server instances, so different users access the same infrastructure at the same time. They have flexible access, meaning they can reach the infrastructure from any location and any device that has a network connection. With regards to security problems, many IaaS providers offer a private cloud environment for cloud hosting [8]. Platform as a Service (PaaS) is a service model similar to IaaS but it provides an additional level of functionality. It is a model for running applications without the need to maintain the hardware and the software infrastructure at organizations. PaaS service providers allow customers to deploy, run or develop applications on their cloud infrastructure. A user does not manage nor control the underlying cloud infrastructure (including network, servers, operating systems), nor storage, but has control over the deployed applications and possibly over configuration settings for the application-hosting environment. PaaS offers software developers several advantages including cost savings, reduced technical maintenance and increased mobility. Costs for purchasing servers, other hardware or required software licenses are reduced or eliminated [8] [9]. Software as a Service (SaaS) cloud model operates on a virtualized and a pay-per-use billing model. In this model, software applications are rented to contracted customers by SaaS service providers. The applications are accessible from various client devices through a client interface, such as a web browser. The client does not operate nor control the fundamental cloud infrastructure including servers, storage, network, operating systems, nor individual application features, with the possible exception of application configuration settings, as specified by the service provider. Applications on providers cloud infrastructure are always up-to-date, preinstalled and configured. This reduces the time spent for installation and configuration of software on local machines. It also allows SMBs to use a software that would otherwise be too costly due to a high licensing fees. Maintenance costs are reduced as well, as the SaaS provider owns the environment and the cost is split among all customers using that solution [8] [9]. C. Cloud deployment models A public cloud is a model that provides users access to the cloud over the Internet, using client interfaces, such as common web browsers. It is typically based on a payper-use model. This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure. Public clouds are less secure than other cloud models because they place an additional burden of ensuring all applications and data accessed on the public cloud are protected from malicious attacks [8]. Security is a very challenging problem in the public cloud model. Service providers are responsible not only for storing data, but also for securing it. Moreover, many organizations and private users are sharing the same resources [7], which means the provider must also implement isolation between different customers. A private cloud is set up for organization s internal use. Service provider is no longer a third party associate, but the organization itself. There are several variations in a private cloud setup. Software components are always run privately. However, hardware modules may be owned by the organization, but also hosted elsewhere. A private cloud approach provides more control over the data ownership and privacy. However, it also implies the organization s own responsibility for setting up both the infrastructure and a software environment, as well as security measures implementation and, later on, the maintenance of each system component. Fig MIPRO 2015/CTI
3 Figure 2. Differences between private and public cloud solutions summarizes advantages and disadvantages of private and public cloud solutions. A hybrid cloud model combines benefits of both private and public cloud. It is composed of two or more different cloud infrastructures that are bound together [9]. III. PRIVATE CLOUD A private cloud may be set up in-house or hosted with a third party service provider. Typically, a private cloud is owned by the organization itself. Organizations may benefit from a private cloud in many ways. When internal infrastructure is used, organization is the sole owner of its data and the only entity having access to it. This reduces or eliminates several potential public cloud service problems, such as sharing platform with other users, possible unauthorized access to the data, changes of providers privacy policy, unexpected service outages, data content restrictions, dependence on a third party organization, control over the equipment and flexibility in a form of cloud bursting. On the other hand, disadvantages of the private cloud model also have to be taken into consideration. Since an organization is running the entire cloud platform, planning and preparation is essential. Initial investment in hardware and software sometimes proves to be a serious obstacle, although, using existing hardware resources with several equipment upgrades, implementation of virtualization techniques and open source software, may significantly reduce the initial cost. After the infrastructure is set up, an organization needs to deploy a private cloud system, implement security measures and enable seamless remote access. The cloud also needs to be maintained and monitored for security and performance. This requires skilled personnel whom not all organizations can afford. Some authors suggest private clouds can obtain some of the public cloud benefits by merging into a hybrid cloud approach [10]. IV. Figure 3. OwnCloud architecture components in an organization IMPLEMENTATION, SECURITY AND FEATURES OF A PRIVATE CLOUD SOLUTION A. Demo environment In this section we explore setup and security aspects of a full-featured open source system for a private cloud implementation. Demo environment was built using virtualized servers on own infrastructure. As an underlying OS, a Linux server distribution was chosen. OwnCloud server was installed on top of the virtualized server. In a typical organization, the cloud would only be connected to the organization's internal network. To gain access to the cloud, remote clients would first need to access organization s LAN, usually by means of a VPN connection. Then, they would be able to access the cloud in the same manner as if they were physically present at the organization's premises. Fig. 3 illustrates components of a private cloud setup in an organization using owncloud. Lab setting allowed us to explore the system in a real everyday use-case scenario. Testing was done on a smaller scale environment, but interpretation of results is applicable to larger deployments. OwnCloud was chosen as a cloud solution, being the most popular open source solution for SMBs at the moment. B. OwnCloud implementation and security Currently, owncloud supports Linux and Windows servers as a system base. Installation of server-side owncloud is supported in different scenarios. In a lab environment, we used Linux packages as a preferred installation method. One of the most important system configuration steps is to implement basic security measures. Using the Secure sockets layer (SSL) and the Transport layer security (TLS) for protected access is highly recommended. SSL/TLS provide both data confidentiality and integrity for TCP/IP transmissions. Client-server communication using TLS protocol should be safe from many security attacks. End-to-end authentication and data confidentiality are provided by cryptographic algorithms in SSL/TLS. It provides a one way authentication, as the servers identity is already known to the client, whereas the client rests MIPRO 2015/CTI 543
4 Figure 4. File encryption in a private cloud system unauthenticated. Two endpoints using TLS connection can be certain that communication is indeed between those two devices, without the presence of a third party [11]. Another strongly advised feature is usage of the owncloud provided Encryption app for the server-side encryption. In this case, after client data arrives over a secure SSL/TLS connection to the server side, the Encryption app executes automatic creation of a 4096-bit private and public key pair for each user. Private keys are encrypted using users login credentials with AES 256 algorithm [12]. Using the keys, the data is encrypted and protected from theft. In case of lost user credentials, administrator may access protected data to recover information. This encryption model is claimed in [12] to be highly secure and optimized to perform well with a larger amount of data, large file sizes and a great number of users. OwnCloud administrators have full control over the encryption keys. Using this encryption model, stored files should be protected from unauthorized access. If absolute confidentiality is required, client-side encryption must be implemented. The client side encryption refers to encryption of data on a client s own device, before sending it through a secure connection towards the server. This way, the data never leaves a user s device unencrypted and not even an administrator can gain access to it. Although neither of owncloud editions offer a client-side encryption, it can be implemented using a third party software, such as Credeon. Fig. 4 shows the aforementioned file encryption scenarios. C. OwnCloud client and features OwnCloud offers data access, synchronization and data sharing across devices, everything in a controlled environment. Its architecture is extensible and works with any storage [13]. Synchronizing owncloud with various devices is reinforced with client applications. Desktop clients are supported for multiple operating systems: Windows, Mac, different Linux distributions and versions, as well as Android and ios for mobile clients. When stored in the owncloud, user s files, folders, contacts, calendars and images are accessible from PCs, laptops, smartphones and other mobile devices at any given time or location. From a user s point of view, only a network connection is needed for data synchronization among devices. Previously synchronized data on desktop devices are accessible without a network connection, since the data are also stored locally. OwnCloud web server acts as a main repository of users data. When a client connects to the server, a system automatically updates two lists of data: the list of data that has remained unchanged, and the list of data that has changed since the last synchronization. In this manner, a client is able to download and send only a list of files that have been changed. This speeds up the process of scanning and analyzing which files need to be updated. Storing and synchronizing is different with mobile devices, as their limited memory is not well-suited for keeping gigabytes of data. Consequently, mobile clients require network connection for data access. D. OwnCloud scalability Both owncloud editions, the owncloud Community and the owncloud Enterprise, were designed to accommodate whole range of application areas [13], and for that they needed a scalable architecture. Scalability issues were analyzed in detail in [14]. SMBs that invest in a dedicated infrastructure for owncloud should have no need to implement anything beyond the simple owncloud setup. However, in case that owncloud is accommodated on an existing infrastructure or an organization grows significantly, a performance or storage bottlenecks could occur. A standard approach to building a scalable solution is to have separate servers for each of the private cloud service tiers, such as database, data storage or application tiers. As this setup is unnecessarily complex and too costly for SMBs, a more adequate solution would be to use a model with collapsed tiers. In a consolidated configuration, shown in Fig. 5, a single computing node can be used to host a web server, the owncloud software, a storage server and a MySQL server. Having two or more such computing nodes behind a load balancer enables the clients requests to be served by each of the nodes in a round-robin manner. OwnCloud allows scaleout of each component to be performed while running, thus providing continuous service - keeping the data accessible and applications uninterrupted. Figure 5. OwnCloud scalable deployment model 544 MIPRO 2015/CTI
5 issue. It preserves data ownership and can improve both privacy and security. The solution we explored is scalable and is suitable not only for SMBs but also for larger deployments. For organizations which do not have enough resources to invest into their own infrastructure or to maintain it, we suggest a hybrid cloud solutions. In this case, a private cloud is hosted on a public cloud infrastructure, making a tradeoff between security and privacy on one side and cost on the other. It allows even SMBs with very limited resources to leverage benefits of the private cloud solutions. Figure 6. Hybrid approach to owncloud deployment E. OwnCloud in a cloud By now, we only discussed deployment of owncloud on a private infrastructure, i.e. within the organization. Another option could be a hybrid approach, in which the infrastructure is provided by an outer cloud service provider [1]. In this configuration, a private cloud system is hosted in a public cloud using leased infrastructure. The approach could be very interesting for businesses looking to minimize initial infrastructure investment and, later on, maintenance costs. Although the infrastructure is leased, with careful cloud implementation, data security should not be significantly impacted. Some organizations may be reluctant to invest in their own infrastructure and this approach might be a compromise which would allow them to have enough benefits of private clouds to alleviate concerns they might have with public cloud systems. Another advantage of a hybrid cloud is flexibility in terms of changing capacity. With a pay-per-use model, an organization can momentarily scale-up or scale-down as necessary, something that is not always possible, especially in the case of SMBs, with own infrastructure. Therefore, a hybrid cloud in some cases may be a better option and a more cost efficient solution, easier and quicker to deploy than a private cloud, but also more secure than public cloud. Running owncloud on an external infrastructure is shown in Fig. 6. V. CONCLUSION Public cloud services are very popular, however, organizations are still cautious with moving their businesses into the cloud. In case of trust or data security being a serious concern, we suggest using private cloud solutions. A private cloud approach eliminates the trust ACKNOWLEDGMENT The work presented in this paper is supported by the University of Rijeka research grant Grant REFERENCES [1] K. Khan, Q. Malluhi, Establishing trust in cloud computing, in IT Pro, September/October 2010, pp [2] F. Doelitzscher, A. Sulistio, C. Reich, H. Kuijs, D. Wolf, Private cloud for collaboration and e-learning services: from IaaS to SaaS, Hochschule Furtwangen University, Germany [3] J. Peng, X. Zhang, Z. Lei, B. Zhang, W. Zhang, Q. Li, Comparison of several cloud computing platforms, in Information Science and Engineering (ISISE), 2009 Second International Symposium, pp [4] R. Giordanelli, C. Mastroianni, The cloud computing paradigm: Characteristics, opportunities and research issues, Istituto di Calcolo e Reti ad Alte Prestazioni (ICAR), [5] K. Atefi, Y. Saadiah, A. Atefi, A survey on digital forensics investigation of Seafile as a cloud storage, in International Journal of Engineering Research And Management (IJERM), vol. 01, October [6] J. Mościcki, M. Lamanna, Prototyping a file sharing and synchronization service with Owncloud, in Journal of Physics: Conference Series, vol. 513, no.4, IOP Publishing, [7] R. Grossman, The Case for Cloud Computing, in ITpro, pp , March/April [8] S. Ramgovind, M. M. Elof, E. Smith, The management of security in cloud computing, IEEE /10, University of South Africa, Pretoria, South Africa [9] P. Mell, T. Grance, The NIST definition of cloud computing, NIST special publication , National institute of standards and technology, September [10] M. Armbrust, A. Fox, et al, A View of Cloud Computing, Comunications of the ACM, vol. 53., April 2010, pp [11] L.Ertaul, S.Singhal, G.Saldamli, Security challenges in cloud computing, CSU East Bay, Hayward, CA, USA [12] OwnCloud, OwnCloud s data encryption model" [13] Official owncloud web page [14] Scale out file sync and share: Deploying owncloud and Red Hat Storage Server on HP ProLiant SL4540 Servers, OwnCloud whitepaper MIPRO 2015/CTI 545
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Freedom for Servers, Drives & Desktops
a cloud commerce marketplace THE CLOUD REVOLUTION: Freedom for Servers, Drives & Desktops...cloud computing is enabling small and medium businesses (SMBs) to compete with the upper echelon of corporate
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Cloud Infrastructure Pattern
1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic
Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Data Protection Simple. Compliant. Secure. CONTACT US Call: 020 3397 9026 Email: [email protected] Visit: www.jms-securedata.co.
Data Protection Simple. Compliant. Secure CONTACT US Call: 020 3397 9026 Email: [email protected] Visit: www.jms-securedata.co.uk COMPLEX CHALLENGES SIMPLE SOLUTIONS Backups Tricky but necessary
LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING
LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING 2 WARNING The Hacker High School Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
Vs Encryption Suites
Vs Encryption Suites Introduction Data at Rest The phrase "Data at Rest" refers to any type of data, stored in the form of electronic documents (spreadsheets, text documents, etc.) and located on laptops,
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
SCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: [email protected] 1, [email protected]
Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief
Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service
Enterprise Resource Planning in Cloud Computing Bhakti C Thorat 1 Siddhesh P Patil 2 Prof.Anil Chhangani 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Enterprise Resource Planning in Cloud Computing Bhakti C Thorat 1 Siddhesh P Patil 2
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
http://www.cisjournal.org Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir
Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir Department of Computer Science Lahore College for Women University, Lahore, Pakistan. [email protected],
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
Virtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
NetSupport Manager v11
Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Data Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
How To Protect Your Data From Harm
Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
The All-in-One Support Solution. Easy & Secure. Secure Advisor
The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
Cloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
The High Availability and Resiliency of the Pertino Cloud Network Engine
The High Availability and Resiliency of the Pertino Cloud Network Engine Executive summary The emergence of cloud network architectures can be directly attributed to the evolution of business IT. As the
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Performance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
About me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. [email protected]
DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
RSS Cloud Solution COMMON QUESTIONS
RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Deployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Maximize your Remote Desktop Services
Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing
