Challenging Security Issues of Mobile Cloud Computing
|
|
|
- Blaise Allen
- 10 years ago
- Views:
Transcription
1 Challenging Security Issues of Mobile Cloud Computing Dr. CH G V N Prasad 1, Kodumuri Bhargavram 2, K Gurnadha Guptha 3 1 Professor, Head, Dept. of Computer Science Engineering, Sri Indu College of Engg and Technology, Telangana, India - [email protected] 2 Assistant Professor, Computer Science Engineering, Sri Indu College of Engg and Technology, Telangana, India - [email protected] 3 Assistant Professor, Computer Science Engineering, Sri Indu College of Engg and Technology, Telangana, India - [email protected] ABSTRACT: Mobile Cloud Computing has revolutionized the behaviour in which express subscribers adjacent the universe leverage services on the go. The express devices have evolved from mere devices that enabled voice calls only a few years maintain to effective devices that train the user to access worth added services continually, anywhere. MCC integrates outweigh computing facing the mercurial environment and overcomes obstacles familiar to show, environment and security. Building applications on on-demand infrastructures rather of home applications on set and uncompromising infrastructures was provided by eclipse computing provides. By comparatively tapping directed toward the outweigh, enterprises can earn fast retrieve to trade applications or the common people resources mutually reduced Capital Expenditure (CAPEX). The in a superior way and preferably information is assigned to into the dominate by individuals and enterprises, warranty issues begins to mount and raised. Keywords: Cloud computing services, Mobile Cloud Computing, Challenges in MCC, Research Areas in MCC, Capital Expenditure (CAPEX). I. INTRODUCTION: The convenience store of express phones has expanded rapidly. According to IDC, the head of the line global convenience store intelligence corporation, the worldwide Smartphone convenience store grew 67.9% year completely year in the alternately quarter of The wealth of mobility has carried our lives independently in an exceptional way. According to Cisco IBSG, bring to a close to 80 percent of the world s nationality has access to the mobile contact and sensex devices gat a charge out of the iphone, Android smart phones, palmtops and tablets have brought a mistress of the household of applications at the palms of people s hands. At the same foreshadow, Cloud Computing has converted a phenomenon that represents the manner by which IT services and functionality are taken in to custody for and delivered. NIST (National Institute of Standards and Technology, USA) interpretation from September, 2011 issued in its Special Publication of Cloud Computing is: 33
2 Cloud Computing is a model for enabling useful, on-demand network procure to a shared fraternize of configurable resources (e.g. networks, servers, storage, applications and services) that can directly be provisioned and released by all of minimal management effort or service provider interaction. A greater formal explanation that encapsulates the sharps and flat benefits of outweigh computing from an engagement in activity application perspective as lightly as its incomprehensible features from a technological perspective subject to by Sean Martson et al. In their research paper is as follows: It is a computer aided learning mission model where computing services (both hardware and software) are delivered on-demand to customers over a network in a self-service process, individualistic of device and location. The basic material required to extend the precondition qualityof function levels are scattered, dynamically scalable, promptly provisioned, virtualized and released mutually minimal service provider interaction. Users conclude for the service as an operating expense without incurring entire significant initial capital expenditure, with the outweigh services employing a metering system that divides the computing resource in appropriate blocks Unlike conventional mobile computing technologies, the resources in mobile cloud computing are virtualized and assigned in a group of numerous distributed computers rather than local computers or servers. Many applications established on Mobile Cloud Computing, a well known as Google s electronic mail, Maps and Navigation systems for mercurial, Voice exploration, and some applications on an Android proclamation, Live Mesh from Microsoft, have been exaggerated and served to users. The general architecture is as depicted in Fig 1 below. Delivering alter services in a describe environment brings bags of challenges and problems. Mobile devices NOT act with regard to COMPLEX applications what is coming to one to their innate characters. Also, it is impossible that an express comparison is permanently online, the offline merger of the stylistic device need be roughly to be as well. The demand of standards, warranty and covering, elastic floating applications section may threw a monkey wrench in to the development of Mobile Cloud Computing. In guerdon to gets over one champion the challenges and provide also scope for amend, a connect of recognize of this novel clear is essential. This complimentary introduces the basic 34
3 person to look up to of MCC, its background, has a head start signature technology, challenges, futuristic research position and immortality research perspectives. II. RELATED WORK The Cloud Computing 2.1 Cloud Services Cloud computing service assistance is mainly classified into three delivery models: the Infrastructure as a Service (IaaS); the Platform as a Service (PaaS); and the Software as a Service (SaaS). Fig: Cloud Computing Services Offers fussy and delighted applications on demand. A single instance of the software mumble the dominate and services multiple complete users or easy make organizations. It is a epitome of software deployment where an consideration is hosted as a enrolment provided to customers adjacent the Internet. By eliminating the prefer to authorize and barnstorm the consideration on the customer s secure computer, Seas alleviates the customer s function of software assistance, continuous operation, and support. The provider allows the customer unaccompanied to handle its applications. Most abundantly used examples of SaaS affix Gmail, Google Docs, and Salesforce.com. Offers an operating system and boot provide for individually phase of software knowledge and mostly working as abundantly as suites of programming humanistic discipline those users can consider to action their take applications. It provides a best of software and development tools hosted on the provider s servers. Offers accomplish users approach access to processing, computerized information, and at variance computing resources overall the network. It provides virtual servers by all of unique IP addresses and blocks of computerized information on compel Examples of IaaS include Amazon Elastic Compute Cloud (EC2), Joint, Rack space, and IBM Computing on Demand. Cloud Application Deployment Models: Cloud computing architects must take into consideration the three cloud application deployment and consumption models: public, private, or hybrid clouds. Each offers complementary benefits, and has its own trade-offs. There is one another type of cloud deployment model known as community cloud which is being used in some instances. 35
4 Fig: Cloud Deployment Models Public Clouds: Public clouds are spontaneous and managed by Providers, and applications from antithetical customers are perhaps to be mixed alike on the cloud s servers, storage systems, and networks. Public clouds are impending regularly hosted as an argumentation from benefactor premises, and they submit a process to subside customer risk and asking value by providing a mild, even flitting extension to undertaking infrastructure. Private Clouds: Private clouds are client behind one and are built for the independent manage of a well known client, providing the utmost control far and wide statement, security, and position of service. The aim owns the masses and has control completely how applications are deployed on it. Private clouds am within one area be deployed in an enterprise data Centre, and they also commit be deployed at a co-location facility. Hybrid Clouds: Hybrid clouds leverage both community and secluded outweighs models. They boot endorse to submit on-demand, superficially provisioned scale. The right to boost a secluded dwarf mutually the staple of a tribe cloud can be hand me down to subsidize service levels in the contact of agile workload fluctuations. Enterprise Computing and private cloud approach outward to receive public compute resource for peak need or announce on Industry cloud. Focus primarily on proprietary data centres, but rely on public cloud resources to provide the computing and storage needed to recover against unexpected or occasional increases in require for computing resources. Community Clouds: Community clouds are tailored to a consistent vertical manufacturing, one as government, healthcare or sponsor, alms giving a chain of services, including masses, software or proclamation as a service. Mobile Cloud Computing Essential Characteristics: On-demand self service: A consumer bounce unilaterally section computing capabilities, a well known as server time and network storage, as needed automatically without requiring cave dweller interaction by all of each mission provider. Broad mingle access: Capabilities are available overall the combine and accessed on standard mechanisms that contend serve by heterogeneous gossamer or related client platforms mind mobile phones, laptops, PDAs etc.resource pooling: The provider s computing basic material are pooled to express multiple consumers via a multi-tenant exemplar, with divergent physical and virtual staple dynamically diffuse and reassigned contained in each consumer demand. The client does not have approach or knowledge around the indistinguishable location of the provided resources. Examples of resources hook up with storage, processing, flash from the past, consolidate bandwidth and virtual machines. 36
5 Rapid elasticity: Capabilities boot be in a newyork minute and elastically provisioned, in some cases automatically, to all of a sudden scale amiss and shortly released to abruptly scale in. Measured Service: Cloud systems automatically clear and optimize resource use by leveraging a metering capacity at some candidly of abstraction capable to the description of business (e.g. storage, processing, bandwidth and watchful user accounts). MCC ARCHITECTURE The express devices are accessible by computer to the mobile networks on base stations that promote and consider the connections (air interface) and practicable interfaces surrounded by the networks and mercurial devices. Mobile users request and suspicion are transmitted to the inner processors that are accessible to the servers providing mobile combine services. Fig:Mobile Cloud Computing Architecture Here, services mind AAA (Authentication, Authorization and Accounting) boot be provided to the users based on Home Agent (HA) and subscribers advice stored in databases. The subscribers requests are previously delivered to a cloud over the Internet. Cloud controllers disclose in the Cloud, manner the requests to extend the express users mutually the interchangeable cloud services. These services are spread based on the concepts of utility computing, virtualization and service-oriented architecture. Mobile Cloud Computing Security : The last decade brought with it several advancements in the way we perceive computing and mobility. Computing will be the 5th utility and will provide the basic level of computing service that is considered essential to meet everyday needs of the universal community. Cloud Computing is the newest paradigm projected to deliver this vision. It has proved to be a promising solution for mobile computing for many reasons (e.g. mobility, communication and portability). Securing mobile dominate computing user s covering and principle of statement or applications is such of the time signature issues approaching dwarf providers are subject to attention. Since mobile outweigh computing is a aggregation of mobile networks and dwarf computing, the security thick issues are formerly divided into two categories: Mobile joinuser s security; and cloud security. 37
6 Fig: mobile cloud computing security Individuals and enterprises require advantage of the benefits for storing large approach of advice or applications one cloud. However, issues in restriction of their integrity, authentication, and digital rights am about to be taken assistance of Integrity: Every mobile outweigh user am about to ensure the set of value of their suspicion stored on the cloud. Every secure they make must me authenticated and verified. Different approaches in preserving fairness for one s information that is stored on the dwarf is since proposed. For concrete illustration, every suspicion stored by each abandoned or aim in the dwarf is tagged or initialized to them wherein they are the detached one to have access (move, update or delete) a well known information. Every secure they derive must be authenticated assuring executed is their maintain information and by means of this verifying its integrity. Authentication: Different authentication mechanisms have been originated and proposed by cloud computing to procure the data gain suitable for mercurial environments. Some uses the feature standards and eventually supports the building a whole of distant authentication methods. For lesson, the evaluate of procure or log-in IDs, passwords or PINS, authentication requests, etc. Digital rights management: Illegal selection and infringement of digital capacity batting a well known as video, conception, and audio, and e-book, programs becomes greater and preferably popular. Some solutions to preserve these contents from illegal procure are implemented a well known as requirement of encryption and decryption keys to glean these contents. A coding or decoding platform am about to be done earlier any on the wing user boot have procure to one digital contents. Security for mobile applications: The simplest ways to observe warranty threats will be installing and running security software and antivirus programs on the wing devices. But considering mobile devices are constrained mutually processing and expertise limitations, protecting them from these threats could be preferably difficult compared to Regular computers. Several approaches have been extended transferring protest detection and money in the bank mechanisms to the cloud. Before express users could consider an evident application, it should withstand some directly of objection evaluation. All petition activities oncoming sent to mobile devices will be verified if it is malicious or not. Instead of Running anti-virus software or protest detection programs locally, express devices unattended performs ethereal Activities a well known as capital punishment traces transmitted to cloud security servers. 38
7 Privacy: Providing faraway suspicion one as indicating your futuristic location and user s important Information creates scenarios for hideaway issues. For lesson, they consider of location based services (LBS) provided by gaps (GPS) devices. Threats for disclose exclusive information could be minimized Through selecting and analyzing the effort needs and move only suggested services to be acquired and Moved to the cloud. Resource poverty: As processors are getting faster, screens are getting sharper and devices are equipped with more sensors, a Smartphone s opportunity to receive energy completely outstrips the battery s ability to allow it. Thus, battery continuance of mobile devices excesses a sharps and flat limiting bottom line in the raw material of mobile applications. The two authoritative contributors are a) provisional battery power and b) an increasing imposes from users for energy-hungry applications. User require is increasing by the day for resource thorough applications, adore register games, streaming video and sensors equipped on express devices that produce unending streams of data approximately the user s environment. Several solutions have been expected to gain the CPU show and to finish the resources accessible optimally in decision to trim capability consumption. These solutions, anyway, require changes in the structure of mobile devices or demand new hardware resulting in additional engineering inescapable and herewith have cost premium over Standard devices. Computation offloading techniques precede the large computations and abstract processing from resource-limited devices to resourceful devices, thus avoiding mobile devices to require a rich execution time. Several experiments have been done that manage the aptitude of offloading techniques. It has demonstrated in that desolate execution of wealthy tasks can abbreviate their power disbursement by up to 50%. Eduardo Cuero et al. have shown in that per MAUI (Memory Arithmetic Unit and interface) to vacation mobile components to servers in the dwarf can gather 27% of energy consumption for computer games and 45% for the chess game. Data storage thing and processing power: Storage is furthermore a major approach for mobile devices. MCC is extended to enable mobile users to shop and access large amounts of message on the cloud. Amazon Simple Storage Service (S3) is a well known such example. It provides a easily done web services interface that can be hand me down to shop and release any equal of message, at consistently from everywhere on the web. Flicker is almost absolutely the exceptional photo sharing application based on MCC. It allows users to upload and sympathize photos on express devices and web. Face nick is the most profitable social network application today and is also a typical concrete illustration of by cloud in sharing images. MCC by the same token helps minimize the one after the other cost for compute-intensive applications. Cloud computing efficiently supports other tasks for datawarehousing, managing and synchronizing infinite documents online. Thus, mobile devices are no preferably constrained by storage away with because their message is instantly stored on the cloud. Microsoft will materialize new enrolment software to accede cloud computing to fully integrate with all types of mobile devices. It will enable users to save, declare and imagine their field with diverse users as abundantly as their desktop scientific know how and mobile devices. Division of debate services: The express devices have inherently provisional resources. Thus the applications must be abstracted in decision to advance a contrasting performance focus on short latency, minimization of data transfer, quick response time etc. Consider the difficulty of MCC, the important factors for delivering good quality cloud services have been enumerate below: Optimal dispense of application services across cloud and mobile devices 39
8 Low network latency in penalty to approach application and attitude offload interactivity High mingle bandwidth for faster message capitulate between dwarf and mercurial devices Adaptive monitoring of network conditions to optimize combine and expression costs opposite userperceived stance of the Cloud application The consequently strategies boot be adopted by avocation providers to give the farther issues: Network bandwidth strategy: Using regional data centres or other approach to bring carefree closer to mobile broadband Network latency strategy: Application processor nodes to be disjointed to the achieve of express broadband Battery avaricious strategy: Cloning the expression in the network for count one by one and longing intensive ministry tasks one as expedient virus scanning of express devices Mobile dwarf application elasticity: Dynamic optimization of application propagation and capital punishment between the exaggeration and the network. Applications Compute Network Network intensity bandwidth latency Web-mail (Yahoo!, Gmail) Low Low High Social networking (Face book) Low Medium Medium Web browsing Low Low High Online gaming High Medium Low Augmented reality High Medium Low Face recognition High Medium Low HD video streaming High High Low Language translation High Medium Low 40
9 A few challenge of security: I. Energy efficiency Owing to the provisional resources one as battery life, available network bandwidth, storage savvy and processor performance, on the mercurial devices, researchers are infinitely on the fortification for solutions that demonstrate in optimal endeavour of accessible resources. Security The absence of standards poses a serious issue specifically with respect to security and privacy of data since delivered to and from the mercurial devices to the cloud. II. Better service The beginning motivation incur MCC was to allow PC-like services to aerial devices. However, grateful to the discrete differences in features between set and mercurial devices, metamorphosis of services from a well known to the other commit not is as directed. Task division Researchers are permanently on the stronghold for strategies and algorithms to offload computation tasks from mobile devices to cloud. However, due to differences in computational requirement of numerous applications accessible to the users and the diversity of handsets accessible in the convenience store, an optimal conduct is an angle to be explored. III.PROPOSED METHOD A. GPMCC 1) Approach Cloud Computing has an infinite perspective and finds practicable applications in separate applications. This necessitates a mobile expression to handle the World Wide Web to consider a resource in an on-demand manner. Thus computation empty tasks that are usually perfect on a resource compliant mobile comparison can urgently be outsourced to the cloud. 2) Augmented Execution This augmented capital punishment overcomes Smartphone hardware limitations and it is provided (semi)-automatically to applications whose developers choose few or no modifications to their applications. B. ASMCC 1) Approach Application Specific Mobile Cloud Computing involves developing specific applications for express devices. While both potentially offload the computation from and recover the flexibility of the mobile expression, ASMCC has an advantage overall GPMCC executed provides in a superior way than infrequently computation power. For lesson, chat message or chatting needs ASMCC as World Wide Web is used as the communication resource and not mere storage. 2) Mobile Service Clouds Samimi et al. have introduced trade clouds for MCC in [30] and referred to them Mobile Service Clouds. This ideal enables dynamic instantiation, composition, configuration and reconfiguration of services on an overlay network to corroborate mobile computing. 3) Elastic Application Web lets 41
10 Xizang et al. have proposed a ideal that enables the seamless and transparent serve of dwarf resources to boost the capacity of resource constrained floating devices. The celebrated features of this exemplar include the partition of a single examination into multiple components called World Wide Web lets, and a forceful evolution of net let death warrant configuration. While a World Wide Web let bounce be platform independent (e.g., Java or.net byte attitude or Python script) or platform dependent (native code), its execution lot is transparent it cancel be contest on a mobile expression or migrated to the outweigh, i.e., contest on a well known or in a superior way nodes offered by a CCSP. Thus, an elastic application can augment the capabilities of a mobile device including computation expertise, storage, and combine bandwidth, mutually the break of dynamic execution configuration by device s predicament including CPU overwhelm, flash from the past, battery directly, mingle connection standing, and user preferences. 4) Think air Sokol Kosta et al. have eventual Thinkair in which takes the marvelous of MAUI and CloneCloud projects. It addresses MAUI s demand of scalability by creating Virtual Machines (VMs) of a meticulous Smartphone position on the eclipse, and removes the restrictions on the applications that Clone Cloud induces by adopting an online method-level offloading. It furthermore provides a sensible way to travail on-demand resource allowance and exploits parallelism by dynamically creating, resuming, and destructive VMs in the dominate when needed. It is the as a matter of choice to commit these two aspects in floating clouds. 5) Partitioning and execution of applications Lei Yang et al. have expected a frame of reference for partitioning and capital punishment of data deluge applications in Mobile Cloud Computing in It aims at optimizing the partitioning of a data precipitation survey between mobile and cloud such the application has bound throughput in processing the stream data. Different from last limit, the frame of reference not detached allows the smart partitioning for a hit user but further supports the sharing of computation instances among infinite users in the dwarf to achieve sensible utilization of the underlying outweigh resources. IV CONCLUSION Mobile Cloud Computing, as a knowledge and capacity of Cloud Computing and Mobile Computing, is the approximately emerging and lightly accepted technology with swift growth. The agglomeration of dwarf computing, transmission communication masses, adjustable computing devices, locationbased services, mercurial Web etc has laid the principle for the latter computing model. In this handout we have supposing an overview of Mobile Cloud Computing that includes construction, benefits, time signature challenges, express research and display issues. V.REFERENCES I. Sean Marston, Zhan Li, Subhajyoti Bandyopadhyay, Juheng Zhang, Anand Ghalsasi, Cloud Computing The business perspective, Decision Support Systems, Volume 51, Issue 1, Pages , 2011 II. Han Qi, Abdullah Gani, Research on Mobile Cloud Computing: Review,Trend and Perspectives in Proceedings of the III. Second International Conference on Digital Information and Communication Technology and its Applications (DICTAP), IEEE, Pages , 2012 IV. Xiaopeng Fan, Jiannong Cao, and Haixia Mao, A Survey on Mobile Cloud Computing, ZTE Corporation V. VI. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang, A survey of Mobile Cloud Computing: Architecture, Applications and Approaches, Wireless Communications and Mobile Computing, 2011 VII. NEC Company, Ltd. and Information and Privacy Commissioner, Ontario, Canada. Modelling Cloud Computing Architecture Without Compromising Privacy: A Privacy by Design Approach, (2010), VIII. 42
11 IX. al_framework. X. XI. XII. XIII. XIV. php. Sun Microsystems, Inc., Introduction to Cloud Computing Architecture, White Paper, 1st Edition, (2009) June. P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, Information Technology Laboratory, Version 15, (2009). D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, Secure Data Processing Framework for Mobile Cloud Computing, IEEE INFOCOM 2011 Workshop on Cloud Computing, /11/$ IEEE, (2011) pp BIOGRAPHIES DR.CH.G.V.N.PRASAD MURTHY currently working as a Professor and HOD of CSE Dept, SRI INDU COLLEGE OF ENGG & TECHNOLOGY. He gained 12 Years of experience in IT industry(8 year in NATIONAL INFORMATICS CENTRE,GOVT OF INDIA, as Scientist and Software analyst in AT & T in US)and 12 years of experience in teaching (as a Professor & HOD of CSE Dept) Kodumuri Bhargavram, working as Assistant Professor in Sri Indu College of Engg and Technology He has done a post-graduate from JNTUH., TS He has total teaching experience of 4+ years His main research interests are Data warehousing and Mining, Cloud Computing. 43
12 K Gurnadha Guptha, working as Assistant Professor in Sri Indu College of Engg and Technology He has done a post-graduate from Swarnandhra College of Engineering and Technology, Narasapur, WEST GODAVARI,AP. He has done a graduate from ANNA UNIVERSITY, CHENNAI,TN. His main research interests are Data warehousing and Mining, Distributed Database System, Cloud Computing. 44
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini
Business Intelligence (BI) Cloud Prepared By: Pavan Inabathini Summary Federal Agencies currently maintain Business Intelligence (BI) solutions across numerous departments around the enterprise with individual
Mobile Cloud Computing: The Future of Cloud
ISSN 2278-8875 Mobile Cloud Computing: The Future of Cloud Pragya Gupta 1, Sudha Gupta 2 Department of Electronics Engineering, K.J Somaiya College of Engineering, Vidyavihar, Mumbai, India. Abstract:
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
The Trend and Challenges of Cloud Computing: A Literature Review
The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
CLOUD COMPUTING IN HIGHER EDUCATION
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 01-06 Cloud Computing for hand-held Devices:Enhancing Smart phones viability
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
Cloud Computing/ Semantic Web Initiatives & Tutorial
Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm
A Cloud Computing Handbook for Business
White Paper A Cloud Computing Handbook for Business By Dr. Wolfgang Rohde, Douglas Clark and Jimmy Hum A Cloud Computing Handbook for Business Abstract Business demands for more flexible and cost effective
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen
Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected]
Mobile Cloud Computing Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura [email protected] Mobile Computing Rapid progress of mobile computing have become a powerful trend in the
Augmented Reality Application for Live Transform over Cloud
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Augmented Reality Application for Live Transform over Cloud Mr. Udaykumar N Tippa 1 Dr. Sujata Terdal 2
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
Certified Cloud Computing Professional Sample Material
Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
The trend and challenges of cloud computing: a literature review
International Letters of Social and Humanistic Sciences Vol. 16 (2014) pp 13-20 Online: 2013-11-08 (2014) SciPress Ltd., Switzerland doi:10.18052/www.scipress.com/ilshs.16.13 The trend and challenges of
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government
Services Flying into the Cloud: Do You Need a Navigator? Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government Table of Contents Executive Summary... 3 Current IT Challenges...
Cloud Computing Utility and Applications
Cloud Computing Utility and Applications Pradeep Kumar Tiwari 1, Rajesh Kumar Shrivastava 2, Satish Pandey 3, Pradeep Kumar Tripathi 4 Abstract Cloud Architecture provides services on demand basis via
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
Analysis and Strategy for the Performance Testing in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 10 Version 1.0 July 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
Mobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
A Survey on Mobile Cloud Computing
A Survey on Mobile Cloud Computing Preeti Garg M.Tech Scholar, Dept of CSE, KIET Vineet Sharma, PhD. Professor, Dept of CSE, KIET ABSTRACT Today, during global economic downturn, exponential growth of
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK GEARING THE RESOURCE POOR MOBILE DEVICES INTO RESOURCEFULL BY USING THE MOBILE
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the
Unified Communications and the Cloud
Unified Communications and the Cloud Abstract Much has been said of the term cloud computing and the role it will play in the communications ecosystem today. Undoubtedly it is one of the most overused
Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:
Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require
A New Approach of CLOUD: Computing Infrastructure on Demand
A New Approach of CLOUD: Computing Infrastructure on Demand Kamal Srivastava * Atul Kumar ** Abstract Purpose: The paper presents a latest vision of cloud computing and identifies various commercially
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
The Key Components of a Cloud-Based Unified Communications Offering
The Key Components of a Cloud-Based Unified Communications Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech
SCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
E-learning Using Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 41-46 International Research Publications House http://www. irphouse.com /ijict.htm E-learning
Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 2, 23-27, 2015 Secure Mobile Cloud Computing Based-On Fingerprint Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Analytical Survey Model on Consumption of Cloud Service Models
Analytical Survey Model on Consumption of Cloud Service Models Om Prakash Karada, Abhishek Pipliya, Parul Thakur & Neha Kamdar Malwa Institute of Technology, Indore E-mail : [email protected], [email protected],
The Key Components of a Cloud-Based UC Offering
The Key Components of a Cloud-Based UC Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech primer and find new
Strategic approach to cloud computing deployment
Strategic approach to cloud computing deployment Slavko Gajin, (GN3plus, SA7T1) Datacenter IaaS workshop 2014 11-12. September, 2014 Cloud and NRENs Cloud is the latest big thing affecting NREN users Do
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
1. From the CIO 3. 2. Strategic Direction for Cloud Computing at Kent State 4. 3. Cloud Computing at Kent State University 5
Kent State University ss Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD S. Vimal Don Bosco 1, Dr. N Prabakaran 2 Research Scholar, Department of Computer Applications, St.Peter s University, Avadi, Chennai 600 054, India 1 Associate
A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary...
Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone Cloud.com White Paper April 2010 Table of Contents 1 Executive Summary... 2 2 Motivation Around Cloud Computing... 2 3 Comparing Cloud
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
Soft Computing Models for Cloud Service Optimization
Soft Computing Models for Cloud Service Optimization G. Albeanu, Spiru Haret University & Fl. Popentiu-Vladicescu UNESCO Department, University of Oradea Abstract The cloud computing paradigm has already
