Sie sind auf Seite 1von 29

Introduction

The term cloud computing is one of the most widely used in the IT industry today. To some, it means revolution and a fundamental shift in the way IT services are delivered to both businesses and consumers. To others, its just about marketers dressing up old ideas in new clothes in an attempt to encourage another round of spending on technology and services. Cloud computing is latest trend in IT world. It is Internet-based computing, whereby shared resources, software and information, are provided to computers and other devices on-demand, like the electric grid. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. The truth is probably somewhere in between. While there is no denying that a bandwagon is rolling,and many suppliers and pundits are jumping on it whether they are justified in doing so or not, some very interesting developments are coming together that are extremely significant. Whether these ideas are totally transforming the world of IT is debatable; perhaps a more accurate description would be to say that a range of significant developments are taking place that together will enable a step change in the ongoing evolution of IT service delivery. Concept of this new trend started from 1960 used by telecommunication companies until 1990 offered point to point data circuits and then offered virtual private networks. But due to network traffic and make network bandwidth more efficient introduced cloud to both servers and infrastructure. The development of this Amazon played vital role by making modern data centers. In 2007 Google, IBM and many remarkable universities and companies adopted it. And in 2008 Gartner highlighted its characteristics for customer as well service providers. Concept and even technological approaches behind cloud computing can thus not be considered a novelty as such and in particular data centers already employed methods to maintain scalability and reliability to ensure availability of their hosted data. What is more, cloud systems are, unlike e.g. grid computing, not driven by research first and then being taken up by industry, but instead originates directly from commercial requirements and solutions. It is hence not surprising, that the term cloud computing and its current understanding only really became popular with Amazons publication of the Elastic Compute Cloud EC2 in 2006 [4], giving rise to a small boom of cloud offerings which mostly consisted in a rebranding of their existent inhouse solutions and techniques, as well as a potential exposition of these capabilities to consumers. Multiple new cloud domains and providers have thus arisen and it is not surprising, that the term has found multiple related, yet different meanings. In particular, the scope of areas and capabilities that so-called clouds are applied for differs thereby strongly. The most typical representatives for cloud related functionalities can currently be found in the following areas: (1) data centres trying to maintain high scalability and increase availability; (2) web server farms automating and stabilizing their servers, respectively the users website; (3) in house attempts to balance resources over the business solutions; (4) external ASP-type offerings.
1|Page

It must be made clear in this context that Clouds do generally not refer to a specific technology or framework, but rather to a set of combined technologies, respectively a paradigm / concept. The Grid and Service Oriented Architectures are often confused as being identical with clouds due to this primarily conceptual understanding (see also section II.C). Likewise, current cloud providers typically build upon proprietary technology sets and approaches based on their in-house solutions -only little efforts have been undertaken so far, to build up a generic framework / middleware supporting all the features related to clouds. Its only been in 2004 that multi-core processing became available for common desktop machines, when Intel finally abandoned the development of a 4 GHz processor and switched to multi-core development instead. Implicitly even more mainstream developers and users investigate the specific advantages and problems of not only horizontal, but also vertical scalability. Additionally, with the Prosumer movement, as well as the growing demand to lower management cost and the carbon footprint make outsourcing more and more interesting for the market. It is to be expected that the cloud paradigm will find further uptake in the future not only as a means to manage the infrastructure of providers, but also to provide smaller entities with the capabilities of a larger infrastructure that they cannot afford to own themselves. At the same time, the cloud paradigm will allow for a set of enhanced capabilities and services not feasible before. Cloud computing provides the capability to use computing and storage resources on a metered basis and reduce the investments in an organizations computing infrastructure. The spawning and deletion of virtual machines running on physical hardware and being controlled by hypervisors is a cost-efficient and flexible computing paradigm. In addition, the integration and widespread availability of large amounts of sanitized information such as health care records can be of tremendous benefit to researchers and practitioners. However, as with any technology, the full potential of the cloud cannot be achieved without understanding its capabilities, vulnerabilities, advantages, and trade-offs. This text provides insight into these areas and describes methods of achieving the maximum benefit from cloud computation with minimal risk.

2|Page

What is cloud computing?


Wikipedia free encyclopedia: Cloud computing is the use of computing resources
(hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users. Examples of cloud computing include online backup services, social networking services, and personal data services such as Apple's Mobile Me. Cloud computing also includes online applications, such as those offered through Microsoft Online Services. Hardware services, such as redundant servers, mirrored websites, and Internet-based clusters are also examples of cloud computing.

Webopedia: Cloud computing is a type of computing that relies on sharing computing


resources rather than having local servers or personal devices to handle applications. In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services -- such as servers, storage and applications -- are delivered to an organization's computers and devices through the Internet. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine.

Investopedia: A model for delivering information technology services in which resources are
retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. This type of system allows employees to work remotely.
3|Page

Cloud computing is so named because the information being accessed is found in the "clouds", and does not require a user to be in a specific place to gain access to it. Companies may find that cloud computing allows them to reduce the cost of information management, since they are not required to own their own servers and can use capacity leased from third parties. Additionally, the cloud-like structure allows companies to upgrade software more quickly.

NIST (National Institute of Standards and Technology ):

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Cloud computing means more than simply saving on IT implementation costs. Cloud offers enormous opportunity for new innovation, and even disruption of entire industries.

4|Page

LITERATURE REVIEW The literature identifies three different broad service models for cloud computing: a) Software as a Service (SaaS), where applications are hosted and delivered online via a web browser offering traditional desktop functionality for example Google Docs, Gmail and MySAP. b)Platform as a Service (PaaS), where the cloud provides the software platform for systems (as opposed to just software), the best current example being the Google App Engine. c) Infrastructure as a Service (IaaS), where a set of virtualized computing resources, such as storage and computing capacity, are hosted in the cloud; customers deploy and run their own software stacks to obtain services. Current examples are Amazon Elastic Compute Cloud (EC2), Simple Storage Service (S3) and Simple DB. The literature also differentiates cloud computing offerings by scope. In private clouds; services are provided exclusively to trusted users via a single-tenant operating environment. Essentially, an organizations data centre delivers cloud computing services to clients who may or may not be in the premises . Public clouds are the opposite: services are offered to individuals and organizations who want to retain elasticity and accountability without absorbing the full costs of in-house infrastructures . Public cloud users are by default treated as untrustworthy. There are also hybrid clouds combining both private and public cloud service offerings . SURVEY CONDUCTED ON CLOUD COMPUTING BY IDC: This section includes survey conducted by international data corporation (IDC). It shows the strength of cloud computing to be implemented in IT industry and gives the potential inspiration to CSP. The section contains the survey related to the growth of cloud, security aspect, cloud is the first priority to the vendors, revenue report, future and current usage, state of cloud to the IT users and popularity survey of cloud computing. a) Cloud growth: The Table 1 shows the cloud growth from year 2008 to 2012. b) Survey on cloud security: The Fig. 1 shows the survey on security. This represents security as first rank according to IT executives. This information is collected from 263 IT professional by asking different question related to the cloud, and many of the executives are worried about security perspective of cloud.

Table of cloud growth 01


Year Cloud IT spending Total IT spending Total cloud spend Cloud total spend 2008 $16 B $383 B $367 B $4% 2012 $42 B $494 B $452 B 9%
5|Page

Growth 27% 7% 4%

c) Top ten technology priorities: This report displayed in Fig 1 collected at the end of 2010 by IDC. This shows that now a days the cloud computing is the first priority by organization in the field of technology. d) World wide IT cloud services revenue by product/service type: Fig: 2 and Fig:3- This survey shows the revenue on cloud in 2009 is 17.4 billion dollars but it will enhance up to 44.2 billion in 2013. e) Current and future usage of cloud in IT: The Fig. 02 shows the graph that is collected by IDC in August 2011. It shows todays usage and future usage of Cloud in different areas.

Figure 01

6|Page

Figure 02

Figurer 03

7|Page

Figure04

Figure 05

8|Page

f) Opinion for the state of cloud computing: The chart shows in Fig. 6 represents the position of cloud according to different executives. Survey conducted from 696 IT consultants about the status of the cloud, what is their opinion related to it. g) Survey on popularity: This survey shows in Table 2 illustrate the popularity of cloud .It illustrates the rapid growth of cloud application, services and devices.

Figure 6: State of cloud computing

Number of Apps Number of Devices

2010 2.3 2

2011 6.5 4 87

%Growth 82% 100% 38%

Connecting Apps to 64 the Cloud

Table 2 : Increased Popularity

9|Page

CLOUD SECURITY ISSUES AND CHALLENGES : Cloud computing is a emerging technology with shared resources, lower cost and rely on pay per use according to the user demand. Due to many characteristics it has effect on IT budget and also impact on security, privacy and security issues .In this section all these issues are discussed. All those CSPs who wish to enjoy this new trend should take care of these problems. As Pakistan is developing country with no any proper IT strategy, a CSP should give their full attention to security aspect of cloud because it is a shared pool of resources. Customer not know where the data are stored, who manage data and other vulnerabilities that can occur. Following are some issues that can be faced by CSP while implementing cloud services. Privacy Issue: It is the human right to secure his private and sensitive information. In cloud context privacy occur according to the cloud deployment model . In Public cloud (accessed through the Internet and shared amongst different consumers) is one of the dominant architecture when cost reduction is concerned, but relying on a CSP to manage and hold customer information raises many privacy concerns and are discussed under: Lack of user control: In SAAS environment service provider is responsible to control data. Now how customer can retain its control on data when information is processed or stored. It is legal requirement of him and also to make trust between customer and vendor. In this new paradigm user sensitive information and data is processed in the cloud on systems having no any, therefore they have danger of misuse, theft or illegal resale. Adding more, this is not patent that it will be possible for a CSP to guarantee that a data subject can get access to all his/her PII, or to comply with a request for deletion of all his/her data. This can be difficult to get data back from the cloud, and avoid vendor lock-in. Unauthorized Secondary Usage: One of the threats can occur if information is placed for illegal uses. Cloud computing standard business model tells that the service provider can achieve profits from authorized secondary uses of users data, mostly the targeting of commercials. Now a days there are no technological barriers for secondary uses. In addition, it has the connected issue of financial flexibility of the CSPs: for example, possibility of vendor termination, and if cloud computing provider is bankrupted or another company get data then what would happen.

10 | P a g e

Transborder Data Flow and Data Proliferation:


One of the attribute of cloud is Data proliferation and which involves several companies and is not controlled and managed by the data owners. Vendor guarantee to the ease of use by copy data in several datacenters. This is very difficult to ensure that duplicate of the data or its backups are not stored or processed in a certain authority, all these copies of data are deleted if such a request is made. Due to movement of data, CP exacerbate the transborder data flow matter because it can be tremendously difficult to ascertain which specific server or storage device will be used, as the dynamic nature of this technology.

Dynamic provision: Cloud has vibrant nature so there is no clear aspect that which one is legally responsible to ensure privacy of sensitive data put by customer on cloud. Security Public cloud not only increases the privacy issue but also security concern. Some security concerns are described below: Access It has the threat of access sensitive information. The risk of data theft from machine has more chances in cloud environment data stored in cloud a long time duration any hacker can access this data. Control over data lifecycle To ensure the customer that it has control over data, if it remove or delete data vendor cannot regain this data. In cloud IAAS and PAAS models virtual machine are used that process and then media wiped but still there is no surety that next user cannot get that data . Availability and backup There is no any surety of availability and back up of data in this environment. In business backup is one of the important consideration . Multi-tenancy It is feature of SAAS that one program can run to multiple machines. CSP use multi-tenant application of cloud to reduce cost by using virtual machine but it increase more vulnerability.

Audit To implement internal monitoring control CSP need external audit mechanism .But still cloud fails to provide auditing of the transaction with out effecting integrity .

11 | P a g e

Trust Trust is very necessary aspect in business. Still cloud is fail to make trust between customer and provider. So the vendor uses this marvelous application should make trust. Weak trust relationship and lack of customer trust cause many problems during deployment of cloud services. Mitigation Steps This section includes mitigation steps and some solution to overcome the issues discussed in previous section. It provides guidelines to the companies that offer cloud services .It will helpful to them to make proper strategy before implementing cloud services. There are some alleviations to reduce the effect of security, trust and privacy issue in cloud environment. There are many adoption issues like user get privilege to control data cause low transaction performance, companies are worried from cyber crimes and as Pakistan is now going to developed so the Internet speed also effect the performance, virtual machines are taking milliseconds to encrypt data which is not sufficient and to avoid risk there is contract between parties to access data . So mitigate such type of problems some action should taken place. Some steps are listed below: Build up an iterative policy for relocation from traditional environment to Cloud environment . Vendors in Pakistan should follow proper strategy moving from their existing system to this new evolution. As this upcoming trend reduce cost but be careful to select possible solutions to avoid problems in this computing and calculate the effect on the system just not consider the outlay. Providers should be aware regarding new changes and assure that customers access privileges are limited. Cloud is a shared pool of resource. Discover the linked service providers that wants to connected to particular Cloud service provider to query, which provider has right to use facts and data . System for monitoring should be request for exclusion Service provider should tell customer for managing polices for security beside providers owned policies, with in the duration of services. Make it sure, that the data being transferred is protected and secured by standard security techniques and managed by appropriate professionals .
Proposed Solutions

The Table 3 shown below gives a look on the solutions that are helpful to the cloud customer and companies offer services in Pakistan with secure and trusty environment.

12 | P a g e

MODELING AND ANALYSIS OF SECURITY ISSUE OF CLOUD This section includes the security model called Security Access Control Service (SACS). The model is analysis through the tool called Hadoop.

13 | P a g e

Security Model for Cloud Computing After considering the issues the practical approach is needed. For this purpose the sample model is designed to implement in the cloud computing architecture. In this paper this model is reviewed and experimental results are observed. Cloud computing architecture is divided into bottom layer that includes virtualized resources and upper layer contains specific services to the user . The model is shown in Fig. 7.

Figure 07: Cloud computing architecture

14 | P a g e

In cloud computing environment, here we introduce the idea of Security Access Control Service (SACS), which represents the composition of system modules. The block diagram is shown in Fig. 8.

The Security Access Control Service (SACS) will helpful toward CSP in Pakistan to implement cloud services with secure data trust. SACS includes Access Authorization, Security API, cloud connection Security modules and are described as under: Access Authorization: used to authorize to users who want to request cloud service. Security API: keeps users use specific services safely after accessing to the cloud. Cloud connection security: This ensures that the safe resource of the upper service layer provided by the bottom resource layer. Process Of SACS The process of SACS is comprised of many steps and are described below: 1) In first step of the process the user creates a local user agent, and set up a temporary safety certificate, then user agent use this certificate for secure authentication in an effective time period It includes the name of host, user ID, name of user , start time and end time, and different attributes for security. The users authorization and security access is complete. 2) In second step when the users job use the source on the cloud service layer, mutual authentication take place between user agent and explicit application, while the application ensure if the user agents certificate is expired, a local security policy is mapped.
15 | P a g e

3) In last according to users requirements, cloud application will make a list of service resource, and then go by it to the user agent. Simulation Tool The experimental results are obtained from Hadoop, an open source version of Google file system and Map-reduce programming specification. It is the software that is used to write applications that process large amount of statistics (multi-terabyte data-sets) in-parallel on big clusters (thousands of nodes) of product hardware with reliable and consistent approach. This is a distributed file base system with framework give high level API and runtime support for making and running applications on large scale data sets [22], There are many simulating tools that are available in market like CloudSim, GrimSim and cloud Analyst which are underlying projects of Melbourne university. Experimental Results and Analysis The proposed tool is the distributed file base system. This tool can be downloaded in Linux base operating system, Ubuntu, and the same can be run on the windows operating system. After installing this on system the individual user name Hadoop is created that is single node .Log in to this user a cluster working like cloud is designed using Java 1.6. Linux is secure operating system so attacks are generated to measure the performance. After that three common attacks are performed on the system like .mandatory access attacks, SQL injection attacks and directory traversal attacks. Directory traversal attack has the purpose of accessing computer files that are not proposed to be accessible. It exploits a lack of security (the software is acting exactly as it is supposed to) as opposed to exploiting a bug in the code [23]. Mandatory access is one of the attacks used to violate the security attribute of an operating system kernel. SQL injection is type of attack that exploits a security vulnerability occurring in the database layer of an application and also called code injection technique. These attacks are implemented on the machine when there is no security model is added to the architecture and result are calculated. After that through programming using Map-reduce SACS is added to the system architecture and results are recorded. Then a table is obtained and is shown in Table 4. On the behalf of the table the chart is obtained and is represent in Fig. 12 and the system performance compare is shown in Fig. 13.

Security Attack results Fig. 9, Fig. 10, and Fig. 11 show the security attack result separately by identifying the attack number and attack rate using SACS and without using SACS.
16 | P a g e

Comparison result The Fig. 12 shows the comparison results of all attacks (Mandatory access, directory traversal, SQL injection) using SACS model and not using SACS model. System performance Fig. 13 shows that no attacks in the first 10 minutes, the system performance which no using security model is better than the using one, the reason is the using one needs some system resources to carry out safety testing. Once the attack starts up, the performance which using security model is better than no using one. After attack, the performance is rapidly increasing. So the cloud computing with the proposed security model has the more stable performance when facing the attack threat, especially a variety of stacks at the same time.

17 | P a g e

18 | P a g e

19 | P a g e

20 | P a g e

IMPACT
Recently participated as a panelist at a cloud computing conference geared toward the financial services market. The topic of the panel was Understanding Public, Private and Hybrid Clouds. I attended most of the panels that day, and I realized that the audience was either confused about the way in which cloud computing could benefit their organization, or they were discouraged because they were hearing about all the advantages they could get by moving to the cloud yet no one laid out a path on how they could get there. There is a lot of confusion around the appropriate cloud solutions for financial service organizations and the reasonable options for moving to the cloud. There isnt a clear message as to how businesses need to approach cloud computing. This article outlines the four types of clouds and highlights the benefits of each for the financial market. Public cloud: Public cloud computing is well known and understood. Organizations such as Microsoft, Amazon, Rack space, Google, Yahoo and many others have filled collocation centers around the world with hardware and equipment that anyone can use. A user can log in, enter their credit card information and instantly have access to an elastic, flexible and scalable infrastructure service. The ability to access data from anywhere on the Internet is known as Infrastructure as a Service or IaaS. The problem is that most organizations, especially most financial service companies, will either never use this solution or they will only use it in an extremely limited way. Very few individuals generally use a public cloud for a specific purpose, for a short period of time. Public clouds are great for dynamic expansion needs over the short term but they dont address future growth. There is also a form of public cloud known as Software as a Service or SaaS. These public cloud providers like Salesforce.com offer access to single or limited application sets that are available over the Internet. Many companies use these powerful software platforms. Individual services dont offer the opportunity to outsource Information Technology (IT) which then allows the elimination of servers and other components of technology infrastructure. SaaS also doesnt include any additional benefits cloud computing can offer. What happened to reduced cost and streamlined IT or enhanced disaster recovery and business resiliency services? What about the option of mobility for users? These benefits are not only critical to financial organizations, but they dont exist if you are only considering a public platform as a cloud solution.

21 | P a g e

There are a few big questions that everyone asks. Can a public cloud computing offering (specifically infrastructure as a service) be secure and compliant? In short, the answer is No. Few organizations will ever be able to use public clouds in a way that achieves the benefits cloud computing boasts. A public cloud computing offering (specifically Platform as a Service) will likely not be a core part of your operations and will therefore never give your organization all the true benefits that you should expect from the cloud.

Private Clouds What about private clouds? Private clouds are very easy to define. A private cloud is when you use dedicated hardware to virtualizes your server environment. Organizations often do this because their dedicated hardware servers are dramatically underutilized. Often the processor on a dedicated server runs at about 10% to 15% utilization. That minimal usage is similar for disk space and memory as well. When you put several virtual machines on a single physical host your software can utilize all the resources available to it. As a result there are some cost savings, as a result of the consolidation, for dedicated hardware, cooling and power. However, the additional licensing fees required for virtualization, the integration and ongoing management fees and the purchase of new hardware
22 | P a g e

can often eradicate these savings. The result for many organizations is that private clouds are a zero sum gain. Building your own private cloud does not offer some of the most exciting benefits promised by cloud computing. These benefits include a pay-as-you-go model, the elimination of capital expenditures, enhanced disaster recovery, reduction in IT personnel or skill set and economies of
scale; all of which are benefits that simply dont exist if you build your own private cloud.

Private clouds can be hosted by someone else and even managed by others on your behalf. Surely that is where all the touted benefits of cloud computing can be realized, right? Wrong! When outsourcing your private cloud to a 3rd party provider or hosting in a collocation center, those same benefits you were promised for moving to the cloud still wont exist.

23 | P a g e

Hybrid Clouds At this point you might be thinking If a public cloud isnt going to give me what I need, and a private cloud isnt going to offer me the benefits I desire, then certainly a Hybrid cloud will, right? Wrong again. A hybrid cloud can mean a lot of things to a lot of people, much like the very term cloud. Some say a hybrid cloud is when a private cloud and a public cloud are joined together. This is probably an accurate definition but even that is open to interpretation. If an organization built a private cloud but needed a temporary boost in computing power then perhaps utilizing a public cloud would satisfy that need. Other organizations that have built private clouds but need their private systems to connect and use data from public sources (such as a hosted email service, public CRM or other hosted service or software-as-a-service) can also be called a hybrid cloud, however, this is the same thing as a private cloud, with its lack of benefit, combined with a public cloud which likely cant be used in any significant way due to privacy, security and compliance concerns. The industry talks about the wonderful solutions available in public, private and hybrid clouds but the reality for most organizations, and for almost all financial organizations, is that none of those options are going to benefit them in any long-term meaningful way. But, there is a solution.

24 | P a g e

Community Clouds The terms Public, Private and Hybrid are often discussed in cloud computing forums and publications but there is a fourth kind of cloud computing environment. The National Institute of Standards and Technology (NIST) published a document in 2005 that has been the foundation for defining cloud computing environments. The majority of what we see and hear about cloud computing stems from their work. They define the community cloud as a fourth type of cloud computing environment. A community cloud is a custom-built multi-tenant cloud platform built for a specific user community. It is like a private cloud in that it is not generally available to the Internet or the public, but more than one client can use it. These clients share a common need.

25 | P a g e

For example there are a few community cloud platforms out there that are designed and built specifically for financial services companies. Financial services companies share common needs such as application sets, connectivity needs, business continuity needs, security needs and compliance requirements. A cloud computing platform designed for a specific community of organizations is the way to achieve all the benefits of cloud computing without compromising security and compliance requirements. Community Clouds provide all the economies of scale, flexibility, pay-as-you-go, business resiliency, elimination of capital expenditures, cost savings and reduced technology resources. No other model will provide this for most standard organizations and certainly not for those that have any privacy, security or compliance concerns. Lets face it; those businesses are few and far between!

26 | P a g e

CONCLUSION
Cloud computing is latest development that provides easy access to high performance computing resources and storage infrastructure through web services. Cloud computing delivers the potential for efficiency, cost savings and improved performance to governments, organizations, private and individual users. It also offers a unique opportunity to developing countries to get closer to developed countries. Developing countries like Pakistan can take the benefits of cloud computing by implementing it in its e-government projects. The paper addresses the issues that can arise during the deployment of cloud services . After identify these problems some steps are explained to mitigate these challenges and solutions to solve the problems. For the vast majority of businesses public, private and hybrid clouds will not grant your organization the promised benefits of cloud computing. This is why so many organizations have put off a cloud migration. They cant get their heads around how any of the standard three cloud options will work for them. This confusion is what I saw in the eyes of everyone at that recent conference. Cloud computing experts tell everyone that cloud computing is inevitable and here to stay. I agree with them. The next wave of IT infrastructure is cloud computing and it is not a matter of if but when. You will adopt cloud computing now or sometime in the near future. When you identify a 3rd party organization that can offer you a community cloud that matches the needs of your unique organization, there are simply too many benefits to put off the migration any longer.

27 | P a g e

References
1.Janakiram MSV Cloud Computing Strategist; (2010), Demystifying the Cloud An introduction to Cloud Computing, Version 1.0 March. 2.Adamov, A ; Erguvan, M.; (2009),The Truth about Cloud Computing as new Paradigm in IT,IEEE International Conference on Application of Information and communication Technologies, AICT 2009. 3.Dikaiakos, M.D; Katsaros, D.; Mehra, P.; Pallis, G.; Vakali, A.; (2010), Cloud Computing Distributed Internet Computing for IT and Scientific Research.Vol.13 ,pp 10, Sept.-Oct. 2009. 4.Shuai Z; Shufen Z; Xuebin C; Xiuzhen H; (2010), Cloud Computing Research and Development Trend, 2nd International conference on Future Networks, 2010. ICFN ' 10. pp 23, 22-24 Jan 2010. 5.Chang, L, Ti ; Chin L; Chang, A.Y.; Chun J, C;(2010), Information security issue of enterprises adopting the application of cloud computing, IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645, 16-18 Aug. 2010. 6.R. Maggiani; (2009), "Cloud computing is changing how we communicate," 2009 IEEE International Professional Communication Conference, IPCC 2009,Waikiki, HI, United states ,pp 1, 19-22 July. 7.Geng L; David F; Jinzy Z; Glenn D; (2009), Cloud computing: IT as Service, IEEE computer society IT Professional, Vol. 11, pp.10-13, March-April 2009. 8.Basit Ali; (2009), Ufone Launches Uconnect, published in TelecomPK.Net,12 August 2009. 9.Muzzammil Sheikh; (2011), PTCL Launched EVO USB become Wi-Fi Hotspot, The Frontier Star (Northwest Frontier Province, Jan 26 2011 Issue. 10.Grobauer, B.; Walloschek, T.; Stocker,E.;(2011), Understanding Cloud Computing Vulnerabilities,5487489 searchabstrSecurity & Privacy, IEEE, Vol 9, pp 50. 11.Gansen Z; Chunming R; Jin L; Feng Z; Yong T; (2010),,Trusted Data Sharing over Untrusted Cloud Storage Providers,2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp 97, Nov. 30 2010-Dec. 3 2010. 12.Pearson, S.; (2009), Taking account of privacy when designing cloud computing services,5071532 searchabstract CLOUD '09. ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009. pp 44, 23-23 May 2009. 13.Kresimir P; Zeljko H; (2010), Cloud computing security issues and challenges, MIPRO 2010, May 24-28, 2010, Opatija, Croatia. 14.Minqi Z; Rong Z; Wei X; Weining Q; Aoying Z; (2010),Security and Privacy in Cloud Computing: A Survey, Sixth international conference on Semantics Knowledge and Grid (SKG), pp 105, 1-3 Nov. 2010.
28 | P a g e

15.Popovic K; Hocenski Z; (2010), Cloud computing security issues and challenge, 5533317searchabstractMIPRO, 2010 Proceedings of the 33rd International Convention , pp 344,24-28 May 2010. 16.Jensen, M.; Schwenk, J.; Gruschka, N.; Iacono, L.L.; (2010), On Technical Security Issues in Cloud Computing, IEEE International Conference on Cloud Computing, 2009. CLOUD '09, pp 109, 21-25 Sept. 2009. 5708519 searchabstract 17.Jianfeng Y; Zhibin C; (2010), Cloud Computing Research and Security Issues, IEEE 2010 International Conference on Computational Intelligence and Software Engineering (CiSE), pp1, 10-12 Dec 2010. 18.Jansen, W.A.; (2010), Cloud Hooks: Security and Privacy Issues in Cloud Computing5719001 IEEE 2011 44th Hawaii International Conference on System Sciences (HICSS), pp1, 4-7 Jan. 2011. 19.Tian L.Q; NI Y,LING; (2010) , Evolution of user Behavior Trust in Cloud Computing, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010),Vol. 7,pp V7-567, 22-24 Oct. 2010. 20.Mathur, P; Nishchal, N.; (2010), Cloud Computing: New challenge to the entire computer industry, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), pp 223. 21.Yuefa D; Wu B; Yaqiang G; Zhang Q; Tang C; (2009), Data Security Model for Cloud Computing, Proceedings of the 2009 International Workshop on Information security and Applications (IWISA 2009) 22.Dean and S. Ghemawat; (2010), MapRduce: Simplified data processing large clusters, communication of the ACM, Vol.51, pages 107-113. 23.Xue J; Zhang J.J; (2010),"A Brief Survey on the Security Model of Cloud Computing",2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

29 | P a g e

Das könnte Ihnen auch gefallen