Cloud Computing: Advantages and Security Challenges
|
|
|
- Derrick Russell
- 10 years ago
- Views:
Transcription
1 International Journal of Information and Computation Technology. ISSN Volume 3, Number 8 (2013), pp International Research Publications House irphouse.com /ijict.htm Cloud Computing: Advantages and Security Challenges Satyakam Rahul 1 and Sharda 2 1 Department of Computer Science and Information Technology Kebbi State University of Science and Technology, Nigeria. 2 Department of Computer Science, Guru Jambheswar University, Hisar, India. Abstract Cloud Computing is a new computing paradigm that has a lot of advantages due to its ability to reduce cost associated with computing while increasing flexibility and scalability for computers. Cloud Computing is a new concept of providing scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. however, security issues especially data security and privacy protection issues, remain the primary concern for its adoption. This paper outlines the meaning, scope, the main security risks and privacy issues of the cloud computing environment. Finally, the paper provides an analysis on data security and privacy protection issues associate with Cloud Computing and possible responses. Keywords: Cloud Computing, Cloud Platform, Data Privacy, Data Security, Models of Cloud Computing. 1. Introduction Cloud Computing can be defined as a computing model for enabling convenient ondemand network access to share pool of configurable computing resources [1] e.g., networks, services, storage, applications that can be rapidly provisioned and released with minimal management effort or service provider interaction. Five essential characteristics [2] of Cloud Computing can be delineated as followingi. On demand self service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without human interaction with each service provider.
2 772 Satyakam Rahul & Sharda ii. Broad network access: Capabilities are available over the network and accessed through standard mechanism that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops ) iii. Resource pooling: The provider s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. iv. Rapid elasticity: Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. The capabilities available to the consumer for provisioning often appear to be unlimited and can be appropriated in any quantity at any time. v. Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service. Cloud Computing is a network based environment that focuses on sharing computations or resources. It refers to both the application delivered as services over the internet and the hardware and software in the datacenters that provide those Services. Clouds offer an opportunity to perform intense computation and large scale data storage without introducing a significant load on devices that are designed to be minimally noticeable. The use of clouds can enable hardware designer to create more compact devices that are less obtrusive to users since there is less need for powerful processing and large storage hardware [3]. Compared with traditional IT models the cloud computing has many advantages. But from the consumer prospective, cloud computing security concerns remain a major problem for its adoption. According to a survey carried out by Gartner [7], more than 70% of Chief Technical Officers believed that the primary reason for not using cloud computing services is that of the data security and privacy concerns. 2. Models of Cloud Computing Cloud Services can be provided into three fundamental categories - Software as a Service (SaaS), Platform as a service (PaaS), and Infrastructure as a Service(IaaS). IaaS is the most basic and each higher models abstract from the details of the lower models. In 2012 network as a service (NaaS) and communication as a service (CaaS) were officially included by ITU(International Telecommunication Union) as part of the basic cloud computing models, recognized service categories of a telecommunication centric cloud ecosystem.
3 Cloud Computing: Advantages and Security Challenges Software as a Service Sometimes it is also referred to as Software on demand. It is a process by which application service provider supplies different software applications over the Internet. With SaaS, a provider licenses an application to customer either as a service on demand through a subscription or sometimes at no charge. This makes the customer free from installing and operating the application on own computer [4]. The users' client machines require no installation of any application-specific software - cloud applications run on the server (in the cloud). SaaS is scalable, and system administration may load the applications on several servers. In the past, each customer would purchase and load their own copy of the application to each of their own servers, but with SaaS the customer can access the application without installing the software locally. SaaS typically involves a monthly or annual fee per user so price is scalable and adjustable if users are added or removed at any point. Some examples of SaaS include - Google Apps, Microsoft office 365, GT Nexus, Marketo and Trade Card. 2.2 Platform as a Service In the PaaS model, cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. The user doesn t manage the infrastructure (including network, server, operating systems and storage) but he controls deployed applications and possibly their configuration. Platform as a Service is an outgrowth of Software as a service. PaaS has several advantages for developers.with PaaS, Operating system features can be changed and upgraded frequently. Some examples of PaaS include - Force.com, OrangeScape, AWS Elastic Beanstalk, Cloud Foundry, Heroku, Google App Engine, Microsoft Azure. 2.3 Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) refers to the sharing of hardware resources for executing services using Virtualization technology.it offers basic infrastructure on demand services and using Application programming Interface(API) for interactions with hosts, switches, and routers, and the capability of adding new equipment in a simple manner. The user has nothing to do with the hardware in the cloud infrastructure but he controls the operating system and deployed application. The service provider is responsible for running and maintain it. To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed. Examples of IaaS include : Amazon Elastic Cloud Computing, DynDns, Google Compute Engine, HP Cloud, iland, Joyent, Rackspace Cloud, Ready Space Cloud Services
4 774 Satyakam Rahul & Sharda 2.4 Network as a Service (NaaS) A category of cloud services where the capability provided to the cloud service user is to use network/transport connectivity services and/or inter-cloud network connectivity services[5]. NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole.traditional NaaS services include flexible and extended VPN, and bandwidth on demand. NaaS concept materialization also includes the provision of a virtual network service by the owners of the network infrastructure to a third party (VNP VNO) [6]. 2.5 Communications as a Service (CaaS) It is an outsourced enterprise communications solution that can be leased from a single vendor. Such communications can include voice over IP(VoIP or Internet telephony), instant messaging(im), collaboration and videoconference applications using fixed and mobile devices. CaaS has evolved along the same lines as Software as a Service (SaaS). The CaaS vendor is responsible for all hardware andsoftware management and offers guaranteed Quality of Service.CaaS allows businesses to selectively deploy communications devices and modes on a pay-as-you-go, as-needed basis. This approach eliminates the large capital investment and ongoing overhead for a system whose capacity may often exceed or fall short of current demand. CaaS offers flexibility and expandability that small and medium-sized business might not otherwise afford, allowing for the addition of devices, modes or coverage on demand. The network capacity and feature set can be changed from day to day if necessary so that functionality keeps pace with demand and resources are not wasted. There is no risk of the system becoming obsolete and requiring periodic major upgrades or replacement. 3. Types of Cloud deployment models 3.1 Public Cloud Public cloud applications, storage, and other resources are made available to the general public by a third party service provider. These clouds are fully hosted and managed by the cloud providers.these services are free or offered on a pay-per-use model. Since consumers have little control over the infrastructure so a process which requires very powerful security are not good for it.in this model no access restriction can be applied and no authorization and authentication techniques can be used. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered). 3.2 Private Cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to
5 Cloud Computing: Advantages and Security Challenges 775 virtualize the business environment, and it will require the organization to reevaluate decisions about existing resources. It is more expensive and secured when compared to public cloud. In the private cloud the cloud service providers and the clients have optimized control of the infrastructure and improved security, since user s access and the network used are restricted. 3.3 Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. By utilizing "hybrid cloud" architecture, companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on internet connectivity. Hybrid cloud architecture requires both on-premises resources and off-site (remote) server-based cloud infrastructure[2]. The major drawback to the hybrid cloud is the difficulty in effectively creating and governing such a solution. Services from different sources must be obtained and provisioned as if they originated from a single location, and interaction between private and public components cam make the implementation even more complicated. An example of a Hybrid Cloud includes Amazon Web Services(AWS). 3.4 Community Cloud It is something like infrastructure shared by several organizations for a common cause and may be managed by them or a third party service provider. These clouds are based on an agreement between related organization. Facebook is one of the examples of community cloud. 4. Security threats in cloud computing There are many security threats with cloud computing because it is comprised of several technologies like databases, operating systems, different networks, transaction management, virtualization etc. Therefore security issues related with these system and applications are applicable to cloud computing as well. According to Gardener [7], before making a choice of cloud vendors, users should ask the vendors for seven specific safety issues, viz. privileged user access, regulatory compliance, data location, data of cloud computing [8]. Following are the main security issues related with cloud computing- segregation, recovery, investigative support and long term viability. Cloud computing security is an evolving sub domain of computer security, network security, and more broadly information security [2]. It also refers to a broad set of policies, technologies, and controls deployed to protect data, application and the associated infrastructure i. Administrative access & Data ownership In cloud computing administrative access are done through internet and this increases the risk. It is very important to control administrative access to data and monitor the access to maintain
6 776 Satyakam Rahul & Sharda protocols. Data in the cloud is globally distributed which brings the issue of jurisdiction and privacy Organizations stand a risk of not complying with government policies [9]. There should be strong policy regarding Data ownership and organizations must comply government policies. ii. Privacy of data Data in the cloud is globally distributed. The user doesn t have information about the location of data and they don t have any control over physical access mechanism to that data. The concept of privacy is very different in different countries, culture and jurisdictions. There is also the question of whose jurisdiction the data falls under, when an investigation occurs.in a distributed system,there are multiple databases and multiple applications. Governments should have at least a minimum common policy to handle this kind of situations. iii. Transmission of data In cloud environment data is sent from one place to another place. Encryption technique is used to for data during transmission but most of the data is not encrypted in the processing time and to process the data for any application it must be unencrypted. An attacker can find a place between communication path. The attacker can change the communication. iv. Sharing of data Data sharing is expanding the use of the data. The data owners can authorize the data access to one party and in turn the party can further share the data to another party. This sharing can create a serious problem like leakage of data to an unauthorized person. Therefore during the data sharing especially when shared with a third party, the data owners need to consider whether the third party continues to maintain the original protection measures and usage restriction. v. Data Integrity : Data can corrupt at any stage and with any type of media.data integrity can be easily achieved in a standalone system with a single database.data integrity in such a system is maintained via database constraints. Data generated by cloud computing are kept in the cloud. So, it is very difficult to check integrity of data by user because the user has no control over data and their location. vi. Key Management The common solution for data confidentiality is date encryption. In order to ensure the effectiveness of encryption, there needs to consider the use of both encryption and key strength. A huge amount of data is stored by the user and it is difficult to encrypt large amount of data. it also requires fast processing speed and good computational efficiency. Encryption and decryption raises the issue of key management. who is responsible for key management. Ideally it is the owner of data but cloud users don t have much expertise to manage the keys, they normally trust the key management of the cloud providers. As the cloud providers need to maintain keys for a large number of users, key management becomes more difficult. vii. Destruction of data When data is no longer is required, it is supposed to be destroyed completely. Due to physical characteristics of storage medium, the
7 Cloud Computing: Advantages and Security Challenges 777 data deleted may still exist and can be restored. This may result in disclose of sensitive data. 5. Possible solutions for security threat in Cloud Computing The problem of key management is a big issue. The Organization for the Advancement of structured Information Standards (OASIS) key management Interoperability Protocol is trying to solve such issues [11]. About data destruction US Department of defense has some guidelines and method but it doesn t explain how these methods are to be achieved [12]. Mowbray [13] proposed a client based privacy management tool. It provides a model to help users to control the storage and use of their sensitive information in the cloud. Randike Gajanayake proposed a privacy protection framework based on information accountability (IA) components [13]. 6. Conclusion Cloud computing is a new and emerging information technology that changes the way IT architectural solutions are put forward by means of moving towards the theme of virtualization of data storage, local networks as well as software. There are many new technologies emerging at a rapid rate, each with technological advancements and with the potential of making human s life easier. Although cloud computing has many advantages there are still many security problem, therefore one must be very careful to understand the limitations and security risks posed in utilizing these technologies. Data Security and privacy protection issues are the primary problem. The biggest security problem is the sharing of resources. This paper has highlighted all these issues of cloud computing. Cloud Security Alliance is a nonprofit organization formed to promote the use of best practice for providing security assurance within cloud computing. Cloud computing has many advantages but it doesn t mean that all business IT needs to move to cloud in addition, As a result moving to cloud computing requires to consider several parameters and most important of them is security. 7. Acknowledgement Authors are thankful to Kebbi State Univ. of Sci.& Tech., Nigeria for providing all essential infrastructural and financial assistance for this research. References [1] Definition of cloud Computing, National Institute of Standard and Technology, V15, csrc.nest.gov/groups/sns/cloudcomputing/clouddef-v15.doc [2]
8 778 Satyakam Rahul & Sharda [3] Challenges in Securing the Interface between the cloud and pervasive systems st IEEE Per Com workshop on Pervasive Communities and Service Control [4] R.L. Grossman The case for cloud computing IT professional, Vol(2),P 23-27,2009 [5] "ITU Focus Group on Cloud Computing - Part 1". International Telecommunication Union (ITU) TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU. T/focousgroups/cloud/Documents [6] Network Vertulization Opportunity and challenges, Eurescom. series/p1956/d1/p1956-d1.pdf [7] Gartener: Seven cloud-computing security risks. InfoWorld [8] Cloud computing security, [9] Ronald L.Krutz, Russell Vines Cloud Security A Comprehensive Guide to secure Cloud Computing, Willey Publishing, inc.,2010 [10] OECD Guidelines on the protection of Privacy and Transborder Flows of Personal Data at [11] OAIS Key Management Interoperability protocol (KMIP) / tc_home.php?ug_abbrev_kmip [12] DoD National Industrial Security Program operating Manual [13] Randike Gajanayake, Renato Iannella and Tony Sahama Sharing with care an Information Accountability perspective Internet computing, IEEE, Vol15,PP 31-38,July- Aug 2011.
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Capability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!
Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era
IS PRIVATE CLOUD A UNICORN?
IS PRIVATE CLOUD A UNICORN? With all of the discussion, adoption, and expansion of cloud offerings there is a constant debate that continues to rear its head: Public vs. Private or more bluntly Is there
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)
Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS
193 APPENDIX 1 CLOUD COMPUTING PHYSIOGNOMIES A 1.1 CLOUD COMPUTING BENEFITS A 1.1.1 Cost Savings The biggest reason for shifting to cloud computing is cost. Any company or enterprise has to face sizable
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?
East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen
Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
The NIST Definition of Cloud Computing
Special Publication 800-145 The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication 800-145 The NIST
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
CLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Certified Cloud Computing Professional Sample Material
Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
The NIST Definition of Cloud Computing (Draft)
Special Publication 800-145 (Draft) The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology Peter Mell Timothy Grance NIST Special Publication
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC
ITSM in the Cloud An Overview of Why IT Service Management is Critical to The Cloud Presented By: Rick Leopoldi RL Information Consulting LLC What s Driving the Move to Cloud Computing Greater than 70%
CLOUD COMPUTING INTRODUCTION HISTORY
1 CLOUD COMPUTING INTRODUCTION 1. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Cloud Computing/ Semantic Web Initiatives & Tutorial
Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 5, May 2013, pg.238
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Knowledge Management in Cloud Using Hadoop
Knowledge Management in Cloud Using Hadoop Vishwas Churihar Dept. of Computer Science Engineering Laxmi Narain College of Technology Bhopal, India (M.P.) [email protected] Shweta Shrivastava Dept.
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Soft Computing Models for Cloud Service Optimization
Soft Computing Models for Cloud Service Optimization G. Albeanu, Spiru Haret University & Fl. Popentiu-Vladicescu UNESCO Department, University of Oradea Abstract The cloud computing paradigm has already
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini
Business Intelligence (BI) Cloud Prepared By: Pavan Inabathini Summary Federal Agencies currently maintain Business Intelligence (BI) solutions across numerous departments around the enterprise with individual
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
How To Understand Cloud Computing
Dr Markus Hagenbuchner [email protected] CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
High Performance Computing Cloud Computing. Dr. Rami YARED
High Performance Computing Cloud Computing Dr. Rami YARED Outline High Performance Computing Parallel Computing Cloud Computing Definitions Advantages and drawbacks Cloud Computing vs Grid Computing Outline
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT [email protected]
Cloud Computing Benefits and Risks Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT [email protected] 10/3/2012 1 Let s make sure we re all talking about the same thing. WHAT IS CLOUD COMPUTING?
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
OVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Cloud Computing in the Czech Republic
Cloud Computing in the Czech Republic George Feuerlicht, Lukas Burkon and Nikos Margaris Cloud Computing Research Group Prague University of Economics Cloud Computing Research Group CCRG@KIT http://cloud-computing.vse.cz/wp/
How To Get A Cloud Based System In Your Country
Cloud Computing: BY Mesay Hailemariarm Moreda, Team Leader, government Applications and electronic Services, MCIT, Ethiopia June, 2012 Infrastructure Services Number of Users (Oct. 2011) Capacity in 5
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Cloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
The Trend and Challenges of Cloud Computing: A Literature Review
The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,
Survey On Cloud Computing
Survey On Cloud Computing 1,2 Heena I. Syed 1, Naghma A. Baig 2 Jawaharlal Darda Institute of Engineering & Technology, Yavatmal,M.S., India. 1 [email protected] 2 [email protected] Abstract
CLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
