Cloud computing security or cloud security is a growing sub-domain of network security, computer security and more broadly information security. It refers to a set politics, technologies and controls deployed to protect the data, applications and the associated infrastructure of cloud computing.
Cloud computing importance is increasing and gaining scientific attention and industrial communities. Cloud computing is one among the top 10 most important technologies and with a better prospect in successful companies and organizations. Cloud computing permit convenient, on-demand network access to a share pool of configurable computing resources that can be rapidly provisioned and released with minimal service and effect provided interaction.
Cloud computing acts as distribution architecture as well as computational paradigm and the main idea of the cloud computing is to provide quick, secure, net computing services and convenient data storage with all computing resources visualized as services and delivered on the internet. Cloud computing binds number of technologies and computing concepts like as Service Oriented Architecture, Virtualization and other similar technologies that dependent on the internet, providing similar business applications online on web browsers to satisfy the needs of the customer while their information and software are stored on the server.
The cloud provides three services to the user, they are
1. Software as a Service (SaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (Iaas)
1. Software as a Service (SaaS) :
The credentials provided to the user is use to provider’s application running on the cloud infrastructure. The client can access these applications from various client devic...
... middle of paper ...
...ity mechanisms may not well in cloud environments as it is a complex architecture that is composed of a combination of different technologies.
References:
1. http://catless.ncl.ac.uk/Risks/25.92.html#subj17
2. http://en.wikipedia.org/wiki/Cloud_computing_security
3. http://scholar.google.com/scholar_url?hl=en&q=http://www.ijest.info/docs/IJEST11-03-04-129.pdf&sa=X&scisig=AAGBfm2L3D3m05F2qLfuVMmHcbVn3lXw6w&oi=scholarr
4. http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428
5. http://www.researchgate.net/publication/259072387_Cloud_Computing_Security_Issues_and_Challenges/file/3deec529df37a5aa28.pdf
6. http://www.safecomputing.umich.edu/protect-um-data/cloud-security.php
7. http://technet.microsoft.com/en-us/magazine/hh536219.aspx
8. http://link.springer.com/article/10.1186%2F1869-0238-4-5
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
...idence of users by agreeing to the policy that the data submitted to their cloud platform will be kept confidential. (Ryan, 2011)
Cloud computing is defined by experts as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The meaning behind the word cloud is that it is a metaphor for the entire online web and its data as well. A cloud service differs from traditional hosting in three different ways. These three differences are that cloud computing is elastic, it is sold on demand, and the service is managed by the provider of the cloud. The easiest way to explain what cloud computing does is that it stores and gives access to different data and programs over the internet rather than just your computer’s hard drive. For it to be actually considered cloud computing it must include data or programs over the internet. Cloud computing can be done anytime, anywhere with an online connection.
Valerdi, Ricardo. "The Cloud Systems." Industrial Engineer n.d.: 28. ABI/INFORM Complete. Web. 1 May 2014. .
Cloud Computing — SAML reduces the complexity of end users who access multiple cloud applications. It allows the user to remember only one password, and if required, use as strong authentication credential just once to securely access all cloud applications.
It is difficult to define cyberculture because its boundaries are uncertain and applications to certain circumstances can often be disputed. The common threads of defining cyberculture is a culture which has evolved and continues to evolve from the use of computer networks and the internet and is guided by social and cultural movements reflective of advancements in scientific and technological information. It is not a unified culture but rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations. Cyberculture, a twentieth century phenomena, has brought challenges unlike any other that the United States has seen in the areas of cyber security and its impact on our most critical institutions. This presentation will focus on the aforementioned three entities where national security is in jeopardy in part due to cyberculture and its intentional use for disruptive and destructive purposes. Breaches of security to the United States Department of Defense, the national power grid and the Chamber of Commerce are very real and omnipresent.
...Currently, there are no other alternatives, but since the emergence of cloud computing it has already started evolving. CIO’s Florentine suspects that cloud computing will be more software based rather than hardware based in the years to come.(Florentine, & Olavsrud, 2013).
To understand how cloud computing can be of value to an organization, it is important to us that we understand the cloud and its components. There are three different types of cloud computing services referred to as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS delivers cloud computing infrastructure servers, storage, network and operating systems as an on-demand service. SaaS is about software deploying over the Internet. PaaS allows a creation of web applications without the complexity of buying and maintaining the software and infrastructure. In this paper, I will suggest that Innovartus Technology Inc should use IaaS as a replacement for PaaS because IaaS is a rapidly developing field with resources such as better services, cost variability, utility pricing model and dynamic scaling.
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
The cloud storage services are important as it provides a lot of benefits to the healthcare industry. The healthcare data is often doubling each and every year and consequently this means that the industry has to invest in hardware equipment tweak databases as well as servers that are required to store large amounts of data (Blobel, 19). It is imperative to understand that with a properly implemented a cloud storage system, and hospitals can be able to establish a network that can process tasks quickly with...
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face. United States President Barack Obama has identified cyber security as a key issue the nation will face. President Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cyber security (“Foreign Policy Cyber Security,” 2013).”
Cloud storage basic terms, is a way to save information to the web that can managed data storage. Cloud computing services are online services, which store this information to a safe and secure location online. It’s offered a quicker, easier and safer backup than conventional methods of file storage such as bookshelves or cardboard files.
Cloud computing is a type of computing that depends on sharing computing resources rather than having local servers or personal device to handle applications.