Cloud Comuting
Cloud Comuting
The National Institute of Standards and Technology (NIST) has defined cloud computing as a
model for enabling convenient, on-demand network access to a shared pool of configurable
computing resources that can be rapidly provisioned and released at minimal cost. efforts to
manage or interact with the cloud provider. Cloud Computing refers to the following concepts
of Grid Computing, Utility Computing, software as a service, cloud storage and virtualization.
These are referred to as a client using the provider's service remotely, known as the cloud.
Cloud computing has the potential to change the way organizations manage and transform
information technology economy of hardware and software at the same time. Cloud computing
promised to bring in a new set of entrepreneurs to get started a company with zero
investments in IT infrastructure. The main goal of this article is to identify privacy and security
issues in distributed environment and interest in cloud computing participants and users.
Intro
At present cloud computing emerged as a web based technology computing that provides a
freedom in the establishment of IT infrastructure. The various cloud vendors do not require
their own infrastructure rather they can rent or use third party providers The basic idea of
Cloud Computing is the sharing of computing resources among a community of users.
The success of cloud computing is another challenge and opportunity for information security
researchers. Information security is defined as the protection of data and processing against
unauthorized monitoring, modification or intervention. This article describes several
information security concepts that apply to all computing systems and information security
research specific to cloud computing. Cloud computing requires holistic security solutions based
on many aspects of large and loose integrated system. A system depends on the success of
each of its functions and on the coherence between them, on the lack thereof which could
allow information security to be compromised. Each of these problems can be addressed at
different levels and subsystems Cloud Computing computer systems on the client and server
side and in the network connecting these systems. The level of these computing functions
range from their low-level hardware implementations through virtual machines and hypervisors
to operating system to the user-visible application.
Any engineering solution involves compromises, and cloud computing security is no exception.
Security and performance the trade-off affects the cost of services provided and the end-user
experience. In cloud computing, the mix of users emphasizes the trade-off between different
levels of security threat and the cost of addressing potential threats. Isolation or stopping
trade-off damage limitation violations must be assessed against continued operation of non-
violated activities. The overhead of breach detection must be weighed against the value of the
monitoring effort. Security implementation is limited current state of the art, and that's a
moving target. In addition to technical issues, it always presents a security perception issue.
Background
Companies have been working to store and protect data for decades and have worked to
protect confidential client data. Businesses have developed cloud computing as a way to
provide secure data storage and processing for businesses and individuals. Many companies in
many industries use cloud storage. Cloud computing, now called simply computing, uses
Internet technology in dynamic applications and storage. Cloud computing has five main
characteristics of on-demand self-service; wide network access; resource pooling; fast elasticity;
and metered service. In addition, cloud computing includes three main types of services:
Infrastructure as a Service, Platform as a Service, and Software as a Service. In addition, there
are four different uses of cloud computing: public cloud, private cloud, community cloud, and
hybrid cloud. The advantages of cloud computing are the availability of computing power,
storage, flexibility, scalability and reduced IT infrastructure overhead costs. Figure 1 illustrates
cloud computing applications. Start-up organizations could take advantage of the move to the
cloud environment by channeling capital expenditures into operational expenditures, making
the cloud 92 attractive when reducing IT budgets. The use of cloud computing is most
commonly adopted by the smallest firms, while medium-sized firms have lower rates and the
lowest rates are in firms with around 100 employees. Larger companies have enough of their
own computing power. In contrast, cloud computing has some disadvantages such as internet
access requirements, speed and direct access to resources. Therefore, it can be quite risky for
companies to be completely dependent on cloud service providers. Any interruption of cloud
services could cause great damage to organizations. Some people in 2016 pointed to the main
advantages: cost savings, security, privacy and reliability. Stakeholders expect these cloud
computing adoption issues to be mitigated or eliminated in the future.
2. Edge Computing
Cloud providers are moving to the edge to respond to the growth of 5G, Internet of Things (IoT)
devices and latency-sensitive applications. Edge computing is not new to the tech industry
glossary, but companies are increasingly adopting it.
Although data centers are built to store large amounts of information in one centralized
location, half of the world's population lives in rural areas. Edge computing enables systems to
become increasingly distributed, bringing data and processing closer to users. This approach
reduces latency, lowers bandwidth costs, and improves connection performance.
4. Cloud areas
Geopolitical regulatory fragmentation, trade protectionism, and industry standards are creating
new, separate compliance ecosystems. Vertical and regional data services and cloud
ecosystems are undergoing a process of consolidation.
Cloud customers try to reduce blocking and single points of failure by using cloud providers
outside their country. Some regions simply do not have a sufficient local offer of platform
services. This leads to cooperative legislation that regulates how cloud services will be
exchanged across borders.
For example, initiatives such as GAIA-X have emerged in European countries due to growing
concerns among technology providers, politicians and researchers.
5. Green cloud
The extensive infrastructure, electricity and cooling required for cloud computing significantly
increase the environmental impact of a business. The US Department of Energy found that data
centers consume 2% of the total electricity consumption in the United States. The average data
center uses 10 to 50 times more energy per floor than a typical commercial office building.
Cloud providers are constantly looking for ways to make hardware and software more efficient.
Even small changes and improvements here can bring significant energy savings in the long run.
E-waste is also a problem, as aging hardware produces millions of tons of waste each year.
Rare earth market shortages and supply chain disruptions are driving demand for better
computer hardware recycling. Responsible business owners are aware of their role in the fight
against climate change and take these factors seriously when it comes to local data centers and
cloud computing.
Techniques of cloud computing:
Virtualization: Virtualization technology in cloud computing involves the use of specialized
programming techniques to create a virtual version of a computing resource that allows cloud
service providers to bring multiple operating systems and computing systems under a single
virtual machine and efficiently distribute an application among multiple users within a single
organization or multiple organizations cost-effectively in an efficient and convenient way. This
cloud computing technique offers unmatched hardware flexibility and significantly reduces IT
maintenance and infrastructure costs, and is the first item on the list of cloud computing
technologies.
Cloud Computing in the same manner, the cloud vendors use the resources as a service and
pay only for resources that they use. Through this sharing of data processing tasks, online
access to computer resources or services and centralized data storage. The best examples are
electric station, in which consumer use power without having the knowledge of infrastructure
to provide the service.
Utility computing is having some features of virtualization, so the large amount of storage or
computing power is utilized at a single time sharing computers. Utility computing is the
packaging of computation resources, such as computation, storage and service as a metered
service.
Network Security
Applications which people used to access within organizations intranet are hence exposed to
networking threats and internet vulnerabilities which includes distributed denial of service
attacks, phishing, malwares and Trojan horses. If an attacker gains access to client credentials,
they can eavesdrop on all activities and transactions, manipulate data, return falsified
information, and redirect clients to illegitimate sites.
Data encryption
Data encryption is one common approach the providers to protect their client’s data but the
question is whether the data is getting stored in encrypted format or not. To store crucial data
organizations can think of private or hybrid cloud where the data will be in secure corporate
firewall.
Conclusion
The essential characteristics of cloud computing is it’s on-demand provisioning, measured
services, network access, elasticity and resource pooling which dramatically reduce
procurement and operating costs and greatly increase the efficiency and effectiveness of
services. Our study recommend, security of information is the most critical risk as cloud
computing conveys a modification in the physical boundaries of information and moving that
information between trusted partners reliably and securely. An organization requires carefully
analyses its security infrastructure, oversight ability, risk profile and contractual obligations
clearly as they are significant obstacles to moving data storage and applications to the cloud
environment. To ensure total information security all areas of security like infrastructure,
application, data storage and privacy and legal issues are need to be covered. Before presenting
the vendor, an organization should have prepared the nature of the information being stored or
transacted with detailed security and legal requirements applicable to their business needs.
Organizations, have realized the benefits of this technology are moving to the cloud some faster
than others which presents the organization with a number of risks to assess.
In order to meet cloud architecture, new security techniques must be developed. On the basis
of three prominent cloud computing service models, a security study was conducted.
References
1- Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure
Cloud Computing, 2010.
2- Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Prepared by the
Cloud Security Alliance, December 2009
3- S. Ramgovind, M. M. Eloff, and E. Smith, "The Management of Security in Cloud computing,"
in Information Security for South Africa (ISSA), 2010, pp. 1-7.
4- P. Mell and T. Grance. (2009). The NIST Definition of Cloud Computing (Version 15 ed.).
5- Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud
computing. International Journal of Information Security and Privacy (IJISP), 4(2), 36-48.
6- Pant Durgesh, Sharma M.K “Cloud Computing “CSICommunication-2009”,Vol-32, pp10-13.