International Journal on Cloud Computing: Services and ArchitectureTrusted Cloud Computing Introduction Cloud computing is a service that many businesses and organizations use to store large amounts of data with more cost efficiency. Using a service such as cloud computing can greatly minimize the cost spent on hardware and software or software licensing for corporations, and at the same time enhance the performance of business processes. The main concern with cloud computing remains primarily with privacy and security since all data and information are stored on the service provider’s network rather than a local personal computer. However, to resolve the problem of security, a Trusted cloud computing platform (TCCP) design was proposed to enable Infrastructure as a Service (IAAS). The suppliers like Amazon EC2 guarantees the trusted execution of virtual machines to provide a closed box execution, facilitating the users to test the IAAS supplier and decide whether the service is secure or not before launching their virtual machines (Santos, Gummadi, & Rodrigues, 2009, p. 1). Considering how important cloud computing had become, TCCP seems to be an ideal solution to the problem of cloud computing privacy and security. Infrastructure as a Service (IAAS) Infrastructure as a service is one of three service models of cloud computing. By using this service, “users install their operating system and their application software on the cloud computing provider’s computer (Rainer,
Cloud computing is a one of the most talked of topics in the field of Information Technology in recent times (Keyun, Joe, Taha, & Ibrahim, 2013). This subject area of cloud computing basically is a term used to describe computer resources available as a service accessible over a network (Darren & Kim-Kwang, 2013). The National Institute of Standards and Technology (NIST) define cloud computing as a model for enabling ubiquitous, convenient, on-demand network access on a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Peter & Timothy, 2011). Due to the attractive nature of the model there has been rise in the use of cloud computing. Gartner, an IT research and consulting firm, says that cloud computing is growing will become the bulk of IT spend by 2016 (Gartner, 2013).
This section of the article describes cloud computing as a group of computer systems connected over a public or private network that provides dynamically scalable infrastructure (equipment and software) for application, data and file storage. This means that the cloud can be easily modified to add or remove resources and infrastructure as needed. In continuing with the overview, the article notes that cloud computing is an innovative approach to traditional computing methods that can be utilized through the different cloud models.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing is an emerging model where users can gain access to their applications from anywhere through their connected devices. A simplified user interface makes the infrastructure supporting the applications transparent to users. The applications reside in massively-scalable data centers where compute resources can be dynamically provisioned and shared to achieve significant economies of scale. A strong service management platform results in near-zero incremental management costs when more IT resources are added to the cloud. The proliferation of smart mobile devices, high speed wireless connectivity, and rich browser-based Web 2.0 interfaces has made the network-based cloud computing model not only practical but
(3) Web Services in the Cloud - instead of delivering full applications, this service allows users to access APIs for added functionality.
“IaaS essentially refers to purchasing the basic storage, processing power and networking to support the delivery of cloud computing applications. It's a logical next step for organizations that want to move specific processes and applications into the cloud, but that still want to maintain a large degree of control and administration over the functions and applications themselves” (Akamai Technologies ).
Over the past several years the term cloud computing has become common in homes and organizations alike. Cloud computing can be defined as a pooled set of computing resources that are furnished via the internet. There are three types of cloud services typically available, these services are Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Organizations can benefit greatly from cloud services because they eliminate the need to buy and manage physical resources. Although such an action cuts cost it leaves organization victim to the vulnerabilities and threats that exist in cloud computing. Throughout this paper I will discuss the vulnerabilities and threats that come
“Cloud computing” simply means “Internet computing “, generally the internet is seen as collection of clouds; thus the word cloud computing can be defined as utilizing the internet to provide technology enabled services to the people and organizations[1]. Cloud computing is a powerful emerging service that provides an optimized and efficient computing platform by using sharing and virtualization concepts and improving availability, scalability, collaboration and agility for users and enterprises [2]. Cloud computing has a rapid growth in IT industries due to the considerable benefits of sorting and maintaining resources in unlimited storages with the most cost efficient method, business continuity and scalability [3]. However, the only hurdle in wide adoption of this newfound technology is lack of security especially in data protection, authentication, and data transmission subject [4].
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
In this work I am proposing to design framework based on trusted computing technology to improve data security and confidentiality in the cloud. In order to do that I will work on defining protocols to make sure that data storage and replication is only done on trusted storage servers and also data access from the cloud is secure for the client and users. Cloud computing allows clients to use computing resources with option of pay per use. It is convenient option used widely in Information Technology industry. Data security and confidentiality is problematic when data transfers to third party.
Our Computing Resources comprise of a range of cloud infrastructure services (IaaS) that deliver virtual platforms or environments for a fraction of the cost. Our services include servers, software, data centre space and network equipment all hosted on the cloud for you to utilise on a 24/7 basis, wherever you are.
Cloud computing comes in three distinct implementations or models, each with its own pros and cons. The advantage is that each can be tailored to meet a specific need. The three different implementations are Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). In IaaS, an organization uses the cloud to provide virtual resources, such as storage space for data or online databases. Amazon’s Simple Storage Service (S3) is an example of IaaS, with customers utilizing the S3 cloud to store information. PaaS implementations run on top of IaaS, giving the organization flexibility to implement customized applications, such as specific portions of Google apps. Finally, SaaS is the transition to almost all operations to the cloud. In SaaS, a small blade system is used to connect to the cloud through an Internet connection where all the software and major computing power is stored. Instead of having an OS installed on each desktop system, the OS and everything else needed is stored on the cloud servers and accessed through a web browser or custom plug-in. (Neamtiu & Dumitras, 2011)
IAAS (Infrastructure as a service) - Allows the users to run any application of their choice on a cloud hardware.
Cloud Computing is considered the latest buzzword in computing today. It describes a form of computing wherein services are accessed through the Internet on an as needed or pay-per-use basis. Some aspect of cloud computing is in use on a regular basis. Understanding this technology, its benefits, and underlying security risks are important for people in most of today’s technical areas. Because Cloud computing is still considered to be in its infancy, an introduction to cloud computing, defining its major components, with a focus on Software-as-a-Service (SaaS), is the foremost theme of this paper. There are three major elements of cloud computing - Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and
Provides service such as storage and other virtualized compute resources and makes them available to customers over the internet. Cloud providers in IaaS manage the physical resources and their hypervisors whereas Cloud customers can run their software stack and manage the content of their allocated virtual resources, including guest operating system. Customers in this sort should, on a fundamental level, have overall control of their data. At the time of writing, Cloud providers have ultimate control of customer data.