Chapter 1 : Introduction
Cloud computing : Cloud computing is a new class of network based computing that takes place over the internet. Large number of remote servers are allow to centralized data storage and there is online access to computer resources and services.
Characteristic that define cloud data ,applications services and infrastructure are given below:
• Remotely hosted : Remotely hosted means data and services in cloud computing are hosted on remote infrastructure.
• Ubiquitous : It means services and data in cloud can be access from anywhere.
• Commodified : It means that in cloud you can pay for what you would want.
Cloud computing Environment
Essential Characteristics that a cloud must possess:
On-demand self-service: A customer
…show more content…
Myth7 Big data is not a big deal : This is wrong that big data is not a big deal.With ever increasing amounts of business, digital data are generating and storing more information.If not taken into account this could lead to damaged and ineffective storage and systems. By moving into the cloud consumer will achieve far greater storage efficiency and a structured approach to data management that will help you achieve and sustain competitive advantage.
Types of cloud computing
Public cloud: The public cloud means the computing services are available on the public Internet. Generally, public cloud providers like Microsoft,Google and Amazon AWS own and operate the infrastructure and offer access over the Internet.Some benefits of public cloud are discussed below:
• The public cloud reduce costs.
• The public cloud is highly scalable.
• Public cloud provides universal scalability.
• Applications and data are automatically upgraded and backed
…show more content…
Encryption mechanisms are depends on the reliability of the difficulty of decryption mechanism. Encryption methods include asymmetric key encryption systems and symmetric key encryption system. Asymmetric key can get high security because it use different keys but encryption and decryption is slow.
2.Security threats in cloud computing, Authors(Farhan bashir shaikh, Sajjad haider),2011
Discription: Services of cloud are used by both larger and smaller scale organizations.Cloud computing has huge advantages but it is a global phenomenon therefore it has some disadvantages. Both the Service providers and the consumers must work together to ensure safety and security of data on clouds. Customers of cloud services are in fear of data loss and privacy.This paper propose to use The Cloud Security Alliance (CSA) release of a new governance, risk management, and compliance stack for cloud computing. The cloud security tools are available for free download, is meant to help organizations create public and private clouds that act accordingly with industry standards for accepted governance, risk, and compliance (GRC) best practices. The GRC stack has three components: a controls framework, a technical foundation and a questionnaire for assessing what the CSA (cloud security alliance) calls for platform-, infrastructure- and software-as-a-service
The idea of accessing, storing, and processing data from online server or virtual server instead of local server is called as Cloud computing. When we store data in our hard disk which is very near to computer that is called as local storage and computing but Cloud computing doesn’t access data from our hard disk.
The first cloud infrastructure that I would like to describe is the Platform as a Service model, also known as PaaS. The platform in PaaS describes the fact that it provides the computers operating system and hardware for the use of applications. To expand on the platform description it easier to say that a company can use this cloud infrastructure in order to run their software rather than having to buy each computer and software to run a program for each computer. A plus side of using PaaS is that new developers are able to test applications in the cloud without crashing their own computer. It is also capable of storing information on the cloud which frees up hardware storage space. The traditional type of networking where you every computer had to be networked and hardwired to each of the
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
7. “What cloud computing really means.” By Eric Knorr, Galen Gruman. Accessed. 21 November 2013. < http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 >
According to Lisa Arthur, big data is as powerful as a tsunami, but it’s a deluge that can be controlled. In a positive way it provides business insights and value. Big data is data that exceeds the processing capacity of conventional database systems. It is a collection of data from traditional and digital sources inside and outside a company that represents a source of ongoing discovery and analysis. The data is too big, moves to fast, or doesn’t fit the structures of the database architecture. Daily, we create 2.5 quintillion bytes of data. In the last couple years we have created 90% of data we have in the world. This data comes from many places like climate information, social media sites, pictures or videos, purchase transaction records, cell phone GPS signals, and many more places. From the beginning of recorded time through 2003 users created 5 billion gigabytes of data. 2011, the same amount was created every couple days. 2013, we created that same amount every ten minutes. Some users prefer to constrain big data into digital inputs like web behavior and social network interactions. The data doesn’t exclude traditional data that is from product transaction information, financial records and interaction channels.
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
The key strategy implementation efforts at Amazon all surround the use of “big data”. Big data is the growth and availability of large volumes of structured/unstructured data. The use of big data has allowed decision making based upon data and analysis instead of past experience and intuition. Big data has directed organizational change in allowing Amazon to expand from an online book store to an internet giant. Revolutionary application of big data has allowed Amazon to create superior service quality while motivating employees by providing real time information to solve customer issues. Big data has strengthened Amazon’s competitive capabilities by pioneering the application of big data and charging a monthly fee to smaller businesses
You may ask what big data analytics is. Well according to SAS, the leading company in business analytics software and services describes big data analytics as “the process of examining big data to uncover hidden patterns, unknown correlations and other useful information that can be used to make better decisions.” As the goal of many companies which is to seek insights into the massive amount of structured, unstructured, and binary data at their disposal to improve business decisions and outcomes, it is evident why big data analytics is a big deal. “Big data differs from traditional data gathering due to that it captures, manages, and processes the data with low-latency. It also one or more of the listed characteristics: high volume, high velocity, or high variety. Big data comes from sensors, devices, video/audio, networks, log files, web, and social media which much of it is generated in real time and in a very large scale.”(IBM) In other words, companies moving towards big data analytics are able to see faster results but it continues to reach exceptional levels moving faster than the average person can maintain.
In short, the Big Data challenges for organizations and enterprises in today's digital age. Once mastered big data, they will have greater chances of success in today's competitive environment, the world would benefit more from the extracted information more accurately, more useful lower costs. Still the criticism revolves around Big Data, however, the field is still very new and we'll see in future Big Data will evolve like.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
Two simple techniques for encrypting information are: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption). Symmetric algorithms are faster, but the main problem associated with this algorithm is key distribution. On the other hand, asymmetric encryption eliminates key security problem, but these algorithms take too much time for encryption and decryption. Certain systems use asymmetric encryption for secure key exchange joined with symmetric algorithms for rapid data encryption. One of highly regarded symmetric algorithms is AES (Advanced Encryption Standard), AES is encryption standard recognized by the U.S. National Institute of Standards and Technology (NIST)
Cloud storage basic terms, is a way to save information to the web that can managed data storage. Cloud computing services are online services, which store this information to a safe and secure location online. It’s offered a quicker, easier and safer backup than conventional methods of file storage such as bookshelves or cardboard files.
Cloud computing is a type of computing that depends on sharing computing resources rather than having local servers or personal device to handle applications.