...I. INTRODUCTION 1.1 Introduction Over the years many organizations have invested in massive in-house computing capacities and specialized Information Technology (IT) staff around the world in order to support their primary business processes or to achieve a competitive advantage. According to Porter and Millar IT creates competitive advantage by giving companies new ways to outperform their rivals. To gain competitive advantage over its rivals, a company must either perform these activities at a lower cost or perform them in a way that leads to differentiation and premium price (Porter & Millar, 1999). These days, organizations are looking for IT to operate more efficiently and help to reduce the overall costs. The concept of outsourcing has contributed to this development by transferring entire business functions to an external service provider. A recent phenomenon in the domain of outsourcing is called Cloud Computing. “Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically re-configured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized SLAs” (Vaquero, 2009). The arrival of the Internet has accelerated the commoditization of IT by providing a perfect delivery...
Words: 4074 - Pages: 17
...Cloud Computing – the Challenges!! ABSTRACT The word ‘cloud’ has become the hottest buzzword these days. Everything has started moving towards cloud and we could feel that ‘Cloud Computing’ as a revolutionary concept that is going to bring us to Internet ubiquity. At the same time there are also barriers to it. This paper discusses about various cloud-computing challenges, security challenges for cloud & security benefits of cloud. Table of Contents Introduction 4 Cloud Computing Challenges 4 Security Challenges 4 Data Security 5 Cloud Computing Security Issues 5 Security Benefits 6 Conclusion 7 Introduction Cloud Computing delivers information or services to customers who pay for what they use. The customer can be an external person or company who is paying for a service or information or an internal customer, such as the application proprietor who is using services that another division within the same company is offering, and who is being charged for consumption. There are two different types of clouds – Public cloud and Private cloud. In public cloud the information and services provided to the customer are from external sources and in private cloud customer gets the information from internal sources. With the public cloud, the customer does not own any storage or server and also no capital expenditure; the customers merely pay money for what they need on demand. With the private cloud, the customer is an internal customer so the company...
Words: 1970 - Pages: 8
...Cloud Computing Benefits, risks and recommendations for information security Rev.B – December 2012 2 Cloud Computing Benefits, risks and recommendations for information security Document History Date December 2009 Version 1.0 Modification Initial Release, Rev.A Author Daniele Catteddu, Giles Hogben Thomas Haeberlen Lionel Dupré December 2012 2.0 Rev.B About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact details This report has been edited by: Lionel Dupré, Thomas Haeberlen For contacting ENISA or for general enquiries about this report, please use the following details: Email: resilience@enisa.europa.eu Internet: http://www.enisa.europa.eu Cloud Computing 3 Benefits, risks and recommendations for information security Legal notice Notice...
Words: 12166 - Pages: 49
...Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley College of Computing Georgia Institute of Technology April 2009 Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley 1 Introduction Cloud computing is a buzzword and umbrella term applied to several nascent trends in the turbulent landscape of information technology. Computing in the “cloud” alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. Practically every new Internet-based service from Gmail [1] to Amazon Web Services [2] to Microsoft Online Services [3] to even Facebook [4] have been labeled “cloud” offerings, either officially or externally. Although cloud computing has garnered significant interest, factors such as unclear terminology, non-existent product “paper launches”, and opportunistic marketing have led to a significant lack of clarity surrounding discussions of cloud computing technology and products. The need for clarity is well-recognized within the industry [5] and by industry observers [6]. Perhaps more importantly, due to the relative infancy of the industry, currently-available product offerings are not standardized. Neither providers nor potential consumers really know what a “good” cloud computing product offering should look like and what classes of products are appropriate. Consequently, products are not easily comparable. The scope of various product offerings differ and overlap...
Words: 19454 - Pages: 78
...Case Study 2: Cloud Computing One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the Cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster. AWS offers low, pay-as-you-go pricing with no up-front expenses or long-term commitments. We are able to build and manage a global infrastructure at scale, and pass the cost saving benefits onto you in the form of lower prices. With the efficiencies of our scale and expertise, we have been able to lower our prices on 15 different occasions over the past four years. AWS provides a massive global cloud infrastructure that allows you to quickly innovate, experiment and iterate. Instead of waiting weeks or months for hardware, you can instantly deploy new applications, instantly scale up as your workload grows, and instantly scale down based on demand. Whether you need one virtual server or thousands, whether you need them for a few hours or 24/7 AWS is a language and operating system agnostic platform. You choose the development platform or programming model that makes the most sense for your business. You can choose which services you use, one or several, and choose how you use them. This flexibility allows you to focus on innovation, not infrastructure...
Words: 1231 - Pages: 5
...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....
Words: 4691 - Pages: 19
...Trust in Cloud Computing Sarah Kim University of Texas at Austin 1616 Guadalupe Suite #5.202 Austin, TX 78701-1213 srhkim@gmail.com ABSTRACT Ayoung Yoon University of North Carolina at Chapel Hill 216 Lenoir Dr. CB #3360 100 Manning Hall, Chapel Hill, NC 27599 ayyoon@email.unc.edu journalists, IT experts, and scholars have addressed challenges of trust in cloud computing often accompanied with concerns for security, privacy, diminishing user control, lack of transparency, and reputation issues (e.g., Ghosh & Arce, 2010; Kahn & Malluhi, 2010; Pearson & Benameur, 2010; Habib, Ries, & Muhlhauser, 2010). Many of the trust-related discussions, however, are often based on the viewpoints of service developers/providers or technology focused (e.g., Hwang & Li, 2010). Cloud service providers (CSPs) saying “trust me” does not necessarily motivate people to respond with “I trust you.” Understanding of users’ thoughts on trust issues in the cloud computing environment is necessary in order to build and preserve trust between users and cloud service providers. PURPOSE OF RESEARCH The present study explores individual end-users’ perspectives of cloud computing, especially issues regarding their trust/distrust of cloud services. While current cloud computing service development focuses on adoption by enterprises and organizations, individual endusers who use cloud services in their everyday lives also constitute an important consumer group. Challenges of trust in cloud computing have gained...
Words: 1654 - Pages: 7
...Cloud Computing Impact,challenges and Solutions Abstract—Cloud computing, as we know is that in its earliest development phases but the popularity it’s gaining is overwhelming. Its features make it standout against the current computing trend. In this survey paper we have covered different aspects of cloud computing its advantages and applications, security concerns, different attacks and their solutions. Introduction Cloud Computing is basically using resources related to computing (can be hardware or software) delivered as services over the internet, Cloud computing has enabled us to pay and use for just whatever resources we need ,and allowing us to increase and decrease the resources needed by us to the extent which is required. Its main aim is to provide its users a fast, secure and convenient way of storing data and providing different computing services (online).The main advantage of cloud computing is that it provides its users with high economic efficiency rate as through decreased use of equipment and less energy consumption. There are many questions which arise which can be Is cloud secure enough to of intruder attacks? Characteristics 1 Fast Cloud computing is a fast way of providing computing services as equipment (Hardware or Software) is provided within the service 2 Versatile Cloud Computing provides its users versatility as it isn’t focused on one same specific application, a cloud can provide many applications at...
Words: 1604 - Pages: 7
... Cloud computing is the latest evolution of Internet-Based Computing. Public internet spawned private corporate intranets, cloud computing is now spawning private cloud platforms. The database is the critical part of that platform. Therefore it is imperative that our cloud database be compatible with cloud computing. Key Design principles of the cloud model: The core design principle is dynamic scalability, or the ability to provision and decommission servers on demand. The shared-disk database architecture is ideally suited to cloud computing. It requires fewer and lower cost servers, it provides high availability, reduces maintenance costs by eliminating partitioning and it delivers dynamic scalability. Benefits of Cloud Computing: a. Lower Costs: All resources are shared resulting in reduced costs. b. Shifting CapEx to OpEx: This enables customer to focus on adding value in their areas of competence. It allows customer to focus their money and resources on innovating. c. Agility d. Dynamic Scalability: It can smoothly and efficiently scale to the spikes with a more cost-effective pay-as-you-go model. e. Simplified maintenance: All Patches and upgrades are deployed across the shared infrastructure. f. Large scale prototyping/load testing g. Diverse platform support h. Faster Management approval i. Faster development With corporate adoption of cloud computing there are explosion of cloud options....
Words: 3040 - Pages: 13
...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...
Words: 5878 - Pages: 24
...Description of cloud: A set of pooled computing resources, delivered over the web, powered by software. Cloud computing a form of computing that involves the interaction of several virtualized resources, meaning that many servers are connecting and sharing information that can expand and contract across servers depending on the amount of servers needed to manage the amount of traffic on various sites. Cloud computing is often provided “as a service” over the internet, typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). Maturing virtualization in information technology systems has enabled increased implementations of the cloud computing paradigm, dissolving the need to co-locate user and computing power by providing desired services through the network. The “cloud” in “cloud computing” stems from the interconnectivity of the computers and computer networks that form the internet because, when these relationships are diagramed, the resulting image looks like a cloud. In its simplest terms, cloud computing is a new mode of computing where technology-enabled services are delivered to a set of consumers from a set of providers over the network. The definition is inclusive of compute, storage, network, application and service elements, typically running in large data centers accessed by a variety of mobile and fixed devices. Unlike prior computing systems that were essentially dedicated to individual businesses...
Words: 3185 - Pages: 13
...Cloud computing is a service delivery model via internet which provides online computing and storage power to users. Being an internet based remote service; users can access the cloud services anytime, anywhere. Cloud computing allows and makes it easier to access technology-enabled services to the users who don’t have adequate technological know-how. These literatures are more focused on core cloud computing service model being deployed and deployment model followed by the cloud service providers. Additionally anticipated and achieved benefits, challenges and growing deployment trend are also analyzed. Methodology This literature review surveyed existing literature available on the database using systematic approach. Each literature is taken from the CEO magazine, Australian computer society and UWS library catalogue and few literatures from Google scholar. For the timely updated information we limited our literature and taken only published journal article after 2005, because cloud computing is come into mainstream practice from that year. Briefly abstract and title of the papers was studied peer-reviewed journal articles are chosen. Cloud computing model All these literature categorize entire cloud computing in three major service models. * Software as a service, SaaS model In this model, application and functional services are designed to be hosted online and delivered via typical web browser. Users don’t have to have a physical copy of the software installed on...
Words: 1348 - Pages: 6
...Group: 5 Cloud Computing: Risk Management Introduction The objective if this research report is to help clients make the tough decision in choosing between Amazon and Google as their companies cloud computing provider. We provide a detailed explanation of cloud and why we focused on Amazon and Google. In helping our clients make their decision we will compare and contrast the two providers using three components. The first component is to examine each providers risk based on preventable risk, strategic risk, and the external risk. From here the report moves into the security measures that the companies have in place to deal with the aforementioned risk. The final component used is the benefits that Google and Amazon can offer our clients by using their service. Background This research report will compare the risks of cloud computing, security measures in place, and the benefits associated with cloud computing technology. More specifically, our report will focus on two of the most important companies in cloud computing—Google and Amazon. While conducting introductory research our team realized that cloud computing risk management is too broad of a topic and the report would be un-useful for our clients. The team decided that the best way to help clients would be to do a comparison of the two companies and show why one provider would be better than the other. In choosing companies we decided to examine Amazon which is the number one most important company in cloud computing...
Words: 5340 - Pages: 22
...about cloud computing and how it is affecting the adoption in companies or organisations. This paper presents advantages disadvantages security of using this technology. This also deals with the importance of using this technology and information management takes place in organisations. It also deals with the improvisation of the flow of information with Cloud. In today’s globalised technological market Cloud computing is one of the most innovated information technologies. It is more attractive for business to adopt because it had many advantages which includes automatic software update, flexibility, increased collaboration. It’s cost effectiveness plays a major role in adopting this technology. Cloud based applications...
Words: 978 - Pages: 4
...In their 2010 Handbook of Cloud Computing, Furht and Escalante defined the technology as being “a new style of computing in which dynamically scalable and often virtualized resources are provided as services over the internet.” Cloud computing is considered to be the next, natural step in the evolution of on-demand information technology services and products (Vouk 2008) and it’s development has become a significant technology trend that many experts expect will reshape information technology (IT) processes and the IT marketplace (Furht & Escalante 2010). Essentially, cloud computing technology enables users to use a variety of devices including; PC’s, laptops, smartphones, and PDA’s to access programs, storage and application development platforms over the internet, via services offered by cloud computing providers. Although the concept of cloud computing is considered to be a relatively new offering, the idea of providing computer resources through a global network is rooted in the sixties. The notion of an "intergalactic computer network" was first introduced in late sixties by American Computer Scientist J.C.R. Licklider, who was responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969 (Kandukuri 2009). Licklider’s vision was to create a technology through which everyone on the globe could be interconnected and accessing programs and data at any site, from anywhere (Kandukuri 2009). Although Licklider’s vision seems to clearly...
Words: 2224 - Pages: 9