I. INTRODUCTION Cloud computing has been ideas as the next generation paradigm in computation. Cloud is an environment of the software and hardware resources in the centers of data that provide diverse services over the network or the Internet to satisfy user’s requirements [1]. The explanation of “cloud computing” from the National Institute of Standards and Technology (NIST) [2] is that cloud computing enables omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. According to the explanation, cloud computing …show more content…
Data security has systematically been a major issue in IT. Data security becomes particularly serious in the cloud computing environment, because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as wireless sensor networks and smart phones. Data security in the cloud computing is more complicated than data security in the traditional data systems. To make the cloud computing be adoptive by users , first to make cloud environment trustworthy to win confidence of users to adopt this technology. Before the data security issues are discussed, the functions of cloud computing are examined first for facilitates and manages the services. Cloud computing environment allow two basic types of functions: computing and data storage. The cloud is growing incessantly because it could provide high performance computational services at cheaper rates. Famous IT companies such as Microsoft, Amazon, Google and Rake space have provided cloud service on the Internet. Organizations and companies are moving and extending their business by adopting the cloud computing to reduce their cost. According to the difference of entree scope, cloud can be divided into three types: public cloud, private cloud, and hybrid cloud. A private cloud is a cloud in which only authorized users can access the Services and privacy from the provider.
Cloud computing is a one of the most talked of topics in the field of Information Technology in recent times (Keyun, Joe, Taha, & Ibrahim, 2013). This subject area of cloud computing basically is a term used to describe computer resources available as a service accessible over a network (Darren & Kim-Kwang, 2013). The National Institute of Standards and Technology (NIST) define cloud computing as a model for enabling ubiquitous, convenient, on-demand network access on a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Peter & Timothy, 2011). Due to the attractive nature of the model there has been rise in the use of cloud computing. Gartner, an IT research and consulting firm, says that cloud computing is growing will become the bulk of IT spend by 2016 (Gartner, 2013).
Cloud computing, even though some of the concepts were around for since as far back as the 1950’s, is considered the latest digital revolution. Cloud computing is a very controversial subject and term because of its old roots however, cloud computing is the evolution of these technologies and paradigms. Cloud is an alignment of procedures, hardware, and software to create a redundant, flexible, and cost-efficient solutions for developers, consumers, and businesses. The cloud allows us to access store and access data from anywhere in the world. The Cloud can scale to theoretically unlimited computing resources such as Central Processing Unit (CPU) power, Persistent Hard Disk Drive (HDD) storage, and Random Access Memory (RAM) to run more robust applications. The unparalleled possibility in scalability of the cloud rids us of the limitations and the growing pains traditionally had when scaling physical devices and at fraction of the cost. This paradigm also allows for companies to focus on what they do best verses needing to investing in, spending time on building the technology to complete their company’s vision.
Cloud computing emerge as a computational prototype as well as a sharing architecture and its main intention is to provide secure, quick, convenient data storage and net computing services and dispatched all
Services such as, data storage and security, are provided by cloud computing over the internet. In cloud computing, users can pay for what they consume (Bisong & Rahman, An Overview of the Securtiy Concerns in Enterprise Cloud Computing, 2011). Cloud computing is an emerging information technology, which can make it easier for the users to manage their data. Cloud computing allows businesses to expand as new cloud-based models are being discussed and implemented as solutions (Bamiah & Brohi, 2011).
Cloud as the term signifies means the computers in a network to be used for data storage remotely and for maintenance. The cloud computing offers reductions in costs and also has increased scalability, reliability and flexibility in its own processes, and is considered as todays one of the most exciting technologies and has seen a rapid growth over the past ten years. The Cloud computing uses advanced level of computational
Cloud computing is innovative which uses well advanced computational power resource and gigantic improvement in storage capabilities, Cloud is the long dreamed vision of computing utilities, which helps in enable ling the sharing of
ABSTRACT: Cloud computing is nothing but an internet based connection to remote servers which allows to store data and access to all services. These services are provided by the third party who owns the infrastructure. Cloud computing is classified into public, private or hybrid. It is a kind of grid computing. It is flexible and easy to adapt. Apart from advantages organizations are very slow in processing the customer resources because it has some security issues and challenges associated with it. Security is the main issue which is becoming a big hurdle for the growth of cloud computing. The companies are worrying to handle some important data to other companies due to these security challenges. This paper is going to give brief
1.Private Cloud: Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally.However Handling private cloud requires serious undertaking of the cloud activities.Even a tiny wrong move could bring major flaw.
Cloud computing relies on sharing computing resources in a virtualized world rather than owning that locally to handle applications. Cloud adoption across the enterprise is a growing reality. Cloud infrastructure is also becoming popular in the scientific research and academic community because of its ability to provide a large number of computing resources for performing large-scale experiments. The advent of the Internet of Things (IOT) and smart mobile computing devices along with secure access to Big Data and immensely improved big-data analytics capabilities have pushed the computing paradigm into new frontiers. Cloud computing offers a completely new infrastructure for utilizing compute and storage
Cloud is a trending term across the Internet and is often confused with data center and virtualization. To begin with, data center and virtualization are centric to the cloud, but scope of the cloud as a whole is much wider. To put in simple words, a cloud is a pool of large configurable resources that are available on demand over the Internet. These resources can be available in the form of storage devices, servers, processors, and network interfaces [4]. Packaging these resources to provide services to end-users is termed as cloud computing. The users are provided with an ease of accessibility
Security Issues : There are many challenges in the area of cloud computing and security is one of them. Increasing the level of security is required for improving the quality of cloud based services. Location of data is a important factor in the security of cloud based computing. Transparency of the data location provides the flexibility for cloud based computing, but this is also a threat related to security. For cloud users, to maintain their personal data is a major issue related to cloud computing security. Technical security and policies for cloud users plays a vital role in the cloud security. To build trust and establish it for customers who want to use cloud services, is another issue related to the cloud based computing. Security attacks is another issue related
According to the definition of the U.S. National Institute of Standards and Technology (NIST, 2011), “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. This cloud model is collected of five essential characteristics, three service models, and four deployment models. Moreover,
Despite its growing importance and necessities, cloud computing has several drawbacks and disadvantages. People need to think twice when it comes to cloud computing. They need to ask themselves questions like whether it is convenient or not, whether it is right or not, whether it is safe or not. No doubt that everyone is getting into it, but still there are several factors that have to be considered like:
Cloud computing environment fundamentally facilitate two basic functions: computing and data storage. Data security remains an issue in the use of ICT, but in the cloud computing environment, it becomes even more worrying issue for its users, because cloud services are delivered over the internet and are provided by large scale data centres. The cloud data centres can be located anywhere in the world, and consumers’ usually have little or no control over how it is stored and managed. Cloud technology is increasingly adopted by companies as it has enormous benefits as well as draw backs. This study analyses security issues within cloud computing environment particularly focuses on privacy and issues regarding data security, how could cloud data in cloud be made more secure and explores various data security solutions and techniques.
There are four deployment models of cloud computing. Each one has its unique benefits, therefore, the most suitable to a business must be chosen wisely. In the public cloud model, the cloud computing infrastructure is hosted at the vendor’s premises by the cloud vendor. The customer doesn’t know about the structure of the cloud nor has control over the location where computing infrastructure is hosted. In the public cloud, the computing infrastructure is shared among organizations. In Private cloud, the computing infrastructure is for one single organization and not shared with any other entities. Some say that private clouds are not considered a part of cloud computing. In comparison to public clouds, private clouds tend to be more expensive but more secure. There are two types of private clouds: On-premise private clouds and externally hosted private clouds. Externally hosted private clouds are hosted by a third party that specializes in cloud computing