...BACKGROUND Today, in order to efficiently and effectively deal with data confidentiality and system security, organizations must adopt an approach that is both holistic and proactive. This decision traditionally involves an evaluation of the business processes involved, assessment of compliance with regulations and standards, and the identification of information systems and technology capability. Cloud Computing has become one of the most discussed and sought after solutions for dealing with such challenges. According to IDC Cloud, research suggests that IT Cloud Services spending will reach $47.4 billion in 2013 and is expected to be more than $107 billion in 2017 with an annual growth rate of 23.5 percent, five times that of the industry (IDC, 2013). Cloud Computing is a resourceful model that allows enterprises to accelerate innovation, decrease infrastructure costs, improve resource utilization, and greater ability to manage information technology security (PwC, 2010). The “Cloud” refers to the Internet, a collection of interconnected networks that communicate with each other, and it can be accessed globally. Cloud Computing employs network resources to deliver services entirely online. The National Institute of Standards and Technology defines Cloud Computing as: “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...
Words: 3764 - Pages: 16
...White Paper Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing—delivering infrastructure, services, and software on demand through the network—offers attractive advantages to higher education. For example, it has the potential to reduce information and communications technology (IT) costs by virtualizing capital assets such as disk storage and processing cycles into a readily available, affordable operating expense. Sometimes selecting a public cloud offering can create risk around security, privacy, interoperability, or performance. When it does, universities should consider private cloud deployment models to realize scale on demand, rapid platform deployment, and lower costs and carbon emissions while minimizing risk. Introduction The cloud-computing market is projected to grow from $40.7B in 2011 to $240B in 2020 (“Sizing the Cloud” by Stefan Ried and Holger Kisker, Forrester Research, April 21, 2011). , Such rapid market growth is a clarion call to all chief information officers (CIOs) to explore the possibilities offered by cloud and to assess the risks. Most are familiar with the cloud concept because many already use some aspect of cloud applications—software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS); for example, Google’s Gmail, iTunes University, and Amazon’s infrastructure, respectively. The cloud space is rapidly adopting a plethora of new acronyms...
Words: 2347 - Pages: 10
...Cloud Resources Vs In-House Deployment (focusing on windows Azure) University Affiliation Student Name Course Code Date Cloud Resources Vs In-House Deployment (focusing on windows Azure) Cloud resources have gained substantial popularity in the recent past owing to its autonomy and the hype of providing instant data management solutions no matter where an individual may be, (GFI Software, 2010). Several factors must be considered when deciding on what type of system will be used to handle the various classes of data within an organization. Data security is key feature; the system settled upon must ensure that the data is safe at all times whether at rest on the server, in transit or while being authenticated, (Bills, et al., 2012). The cost implications of the system to be adopted should be favorable and not compromise the data security for the affordability feature. Cloud resources offer a very lucrative deal to organizations because they will not need to invest on new infrastructure (servers), no software licensing fees, and all the hard work is done by a third party agency, (Cisco, 2012). Designing a cloud system to handle organizational data is an elaborate process that requires consideration of several issues because the cloud has more potential risks that local storage. For instance, a third party protects the data stored in the cloud and there is a possibility of intruders breaking into the server and causing harm, (Jansen & Grance, 2011). In that case, the law...
Words: 817 - Pages: 4
...public cloud computing services “The agility, cost savings and fast response times of public cloud services can afford financial enterprises huge business opportunities”,says Stephen Schmidt, vice-president and chief information security officer of Amazon Web Services (AWS).As is becoming more and more known to us,public cloud computing services promises to play an important part in our society. A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. A public cloud is a set of computers and computer network resources based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet[1] . Public cloud services may be free or offered on a pay-per-usage model.In the public cloud, your network resources and IT expenses are shared among users – resulting in lower costs, while allowing for total elasticity. For instance, if your network calls for more resources one month, while less the next, scaling your network to match is as simple as flipping a switch.Technically there may be little or no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network. Generally, public...
Words: 1363 - Pages: 6
...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...
Words: 5878 - Pages: 24
...Cloud Computing Service for all most everything | Submitted To:Dr. Richard EganSubmitted By:Team 2 | Table of Contents Cloud computing 2 Introduction 2 Definition of Cloud Computing 3 Services Models of cloud computing 4 Software as a Service (SaaS): 4 Platform as a Service (PaaS): 5 Infrastructure as a Service (IaaS): 5 Deployment Model of cloud computing 5 Public Cloud: 5 Private Cloud: 6 Community Cloud: 6 Hybrid Cloud: 6 Challenges of cloud computing 7 Benefits 7 Implementation Plan 9 How Does Data Stay Safe in the Cloud? 9 Are your applications ready to run on cloud? 9 Will you able to receive customer support for the service? 10 Client considerations for Best Practices during Implementation and Deployment 10 Implementation Strategy 10 Cloud architecture: 10 Market Analysis 11 Important Questions to be address by management 11 Implementation Cycle 12 References (Author, Year) 14 Cloud computing Introduction Whenever technology changed or company move to new business plan, it costs them and many of these companies cannot afford in current economic environment. And most of the time all the investments are not useful at the same time. They wish to “pay for what they use” services and use their efforts and money in main business to add value to it. So these challenges and expectations cause the born of cloud computing.Cloud Computing provides a simple, economicaland efficient way to access servers, storage, databases and a broad set of application...
Words: 3580 - Pages: 15
...Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn (1). The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 (2). The key conclusion of this paper is that the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of view. The massive concentrations of resources and data present a more attractive target to attackers, but cloud-based defences can be more robust, scalable and cost-effective. This paper allows an informed assessment of the security risks and benefits of using cloud computing - providing security guidance for potential and existing users of cloud computing. The security assessment is based on three use-case scenarios: 1) SME migration to cloud computing services, 2) the impact of cloud computing on service resilience, 3) cloud computing in e-Government (e.g., eHealth). The new economic model has also driven technical change in terms of: Scale: commoditisation and the drive towards economic efficiency have led to massive...
Words: 756 - Pages: 4
...Cloud Computing and Security ITM 5600 Thomas Payne Webster University Cloud Computing and Security The National Institute of Standards and Technology (NIST) define cloud computing this way. “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)); and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud). Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server computers, and (3) high-performance virtualization for commodity hardware” (National Institue of Standards and Technology, 2011). There is a lot to take in from that lengthy definition. This may explain why there is so much ambiguity and “hand wringing” surrounding cloud computing. Major companies and government alike have started to embrace cloud services and architecture. This hasn’t been an easy transition, however many higher level managers are not aware or just not informed on...
Words: 4426 - Pages: 18
...School of Computing and Mathematics Faculty of BCL Request for Ethical Approval for Individual Study / Programme of Research by University Students Students conducting PG Independent Scholarship (PG IS), UG Applied Research Project (UG ARP), UG Maths Projects (UG MP) or Learning-through-Work (LTW) projects must complete this form and submit to their project supervisors for approval. After initial approval, project supervisors need to submit these forms to PG IS, UG ARP, UG MP or LTW coordinator who would then submit these to the Chair of the Computing Ethics Committee (CREC) for further consideration. Students conducting PG Research projects (eg MPhil, PhD etc) must also complete this form and submit to their research supervisors for approval who would then submit these to the Chair of the CREC for further consideration. Feedback on your application will be via the Project/Research Supervisor. 1. Your Name: | | 2a. Programme name and code: BSc (Hons) Information Technology (G502)2b. Your student ID: | 3. Contact Info | Email: Tel No. Address: | 4. Module name and code | Applied Research Project | 5. Name of project/research supervisor: | 6. Title or topic area of proposed study: Assessing the benefits and fears of Cloud computing for the Small and Medium Enterprises | | 7. What is the aim and objectives of your study? | The aimThe aim of this study will be to perform an assessment of the extent of benefits...
Words: 3493 - Pages: 14
...INTRODUCTION TO CLOUD COMPUTING ARCHITECTURE White Paper 1st Edition, June 2009 Abstract Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. Sun takes an inclusive view of cloud computing that allows it to support every facet, including the server, storage, network, and virtualization technology that drives cloud computing environments to the software that runs in virtual appliances that can be used to assemble applications in minimal time. This white paper discusses how cloud computing transforms the way we design, build, and deliver applications, and the architectural considerations that enterprises must make when adopting and using cloud computing technology. This page intentionally left blank. Sun Microsystems, Inc. Table of Contents Introduction................................................................................................... 1 Sun’s perspective ................................................................................................ 1 The Nature of Cloud Computing ....................................................................... 3 Building on established trends............................................................................. 3 Virtual machines as the standard deployment object ........................................ 3 The on-demand, self-service, pay-by-use model .....................................
Words: 11952 - Pages: 48
...net/publication/259072387 Cloud Computing Security Issues and Challenges ARTICLE · JANUARY 2011 CITATIONS READS 13 20,419 1 AUTHOR: Ibikunle Ayoleke Botswana International University of Science… 29 PUBLICATIONS 30 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. Available from: Ibikunle Ayoleke Retrieved on: 13 February 2016 Kuyoro S. O., Ibikunle F. & Awodele O. Cloud Computing Security Issues and Challenges Kuyoro S. O. afolashadeng@gmail.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. faibikunle2@yahoo.co.uk Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. delealways@yahoo.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Abstract Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing...
Words: 4240 - Pages: 17
...This paper will explain cloud computing services and the future of this information technology system. Reasons cloud computing will be a paradigm shift in the way information technology will be designed, managed and used will be discussed. An explanation for the drive towards this change and pro’s and con’s surrounding the move. Also, details explaining the cloud computing, how it works, and how it is different from what we have today. Today the majority of the information technology shops are considered to be Locally-installed and managed IT shops, ‘traditional’ or on premise. In recent years, we have seen an increase in an interest and move towards what many refer to as the cloud or cloud computing. In the simplest terms, cloud computing is putting your data on someone else’s hard disk and accessing it via a network. Many describe or associate words or phrases like, Hosted services form the Internet, utilization of Web 2.0, or ASP 2.0 with cloud computing. Cloud computing characteristics include Multi-tenant, external data storage, virtualization, on-demand, Subscription-based model, Elastic and Web based. Typically, cloud computing can be divided into three distinct groups; Infrastructure-as-a-Service, Platform-as-a-Service and Software-as-a-service. With Infrastructure-as-a-Service, one would have to install OS and software on that hard disk themselves. Products such as Amazon EC2 and Citrix Cloud Centre are referred to as Infrastructure as a service or IaaS...
Words: 1389 - Pages: 6
...Cloud Computing Group Members Ruth Wanjiru Cliff Kinyua Maritim Leonard Alphonse Kinyua Tracy Gathoni Abstract. Cloud computing is Internet-based computing, whereby shared information, resources, and software, are provided to terminals and portable devices on-demand. It is a rapidly developing and excellent promising technology. Cloud computing is the product of the combination of grid computing, distributed computing, parallel computing, and ubiquitous computing. Cloud Computing model has enabled IT organizations to serve the users globally. It gives the services like Platform as a Service, Software as a Service and Infrastructure as a Service without users being much aware of the details in which the services are provided. History: The origin of the term “cloud computing” is nebulous. The term only gained traction around 2006 or 2007, but we found references dating back from much earlier [7] The idea of an "intergalactic computer network" was introduced in the sixties by J.C.R. Licklider, who was responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969. John McCarthy proposed the idea of computation being delivered as a public utility, similar to the service bureaus which date back to the sixties. Since the sixties, cloud computing has developed along a number of lines, with Web 2.0 being the most recent evolution. Salesforce.com in 1999 pioneered the concept of delivering applications via a simple website...
Words: 1348 - Pages: 6
...Introduction Cloud computing is the new concept of flexible access to resources over an “always on” or readily accessible network. It enables user access to a convenient network that is on demand to be shared in a field of configurable computing resources. These services are provided over the internet. They include storage services and applications that can be quickly provided and released with no significant management effort or customer care service interaction. The entertainment industry heavily relies on cloud computing as well as the IT infrastructure. This is because the industry is very fluid; it is constantly changing and evolving. It is a very attractive business for people who are required to be up-to-date in current issues in information technology. Cloud computing has bridged the gap of time and distance taken to achieve activities that would consume a lot of time in the past. This industry has been greatly associated with innovation, inspiration and works of art. Most people in this industry deal with products that they are passionate about. Anyone in the entertainment industry requires them to be conversant with each and every new technology involved in this industry in the 21st century (Chard, Caton, Rana & Bubendorfer, 2010). Most enterprises now use cloud computing technology in all their organizations with experts pointing out that the entertainment industry is one of the industries taking the highest percentage. The industry relies on the response...
Words: 2870 - Pages: 12
...“Current Security Issues in Cloud Computing”. As of today, cloud computing is a flexible, cost-efficient, and established transfer platform for giving business or user IT services on the internet. Yet, cloud computing presents an additional level of risk because crucial services are time and again outsourced to a moderator. This makes it more difficult to uphold data security, privacy, support data, service availability, and validate compliance. It is my goal to discuss some of the current issues involved with the cloud and how important that they are to everyone. What is Cloud? Cloud computing is a capable computing regular where computing resources in big data points are made accessible as services over the internet. It has become a renowned IT by presenting a professional atmosphere for data storage capability. It is a standard for computing and is provides a striking, enormous, significant asset that contains any subscription-based or pay-per-use service over the web. Cloud is on-demand admission to virtualized IT services and products. Places like Amazon and Google are presently giving such services, by charging customers by means of an on-demand strategy. Being that consumers put their sensitive information on the clouds public domains, huge problems for cloud implementation are lack of security and access control. The key obstacle is that the doubtful info drifts as service providers can access numerous computer-generated mechanisms in clouds. The cloud takes virtual...
Words: 2156 - Pages: 9