Abstract— Cloud Computing is an approach in the field of information technology which satisfies end user requirements for computing resources like services and applications. Security of access to critical and confidential information in banks, institutions etc. are extremely essential. We can improve security of data access in cloud computing using location based encryption and authentication. Key Words— Cloud Computing, Geo-Encryption, Security, Services I. INTRODUCTION With the advancement of technology, threat to information security and data security also get increases. Many times information and data are confidential in case of corporate field, bank and military intelligence. On the other hand with the increasing number of …show more content…
In common usage, the term “the cloud” is essentially a metaphor for the Internet. Marketers have further popularized the phrase “in the cloud” to refer to software, platforms and infrastructure that are sold “as a service”, i.e. remotely through the Internet. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network B. Types of Cloud 1) Public Cloud The idea is to host applications, Web applications in general, on shared environment with an unlimited number of users. The implementation of this type of cloud is managed by third parties (such as Amazon, Google, etc...) 2) Private Cloud This is a deployed environment within an enterprise Thus; it must man- age its infrastructure alone. In this case, implement a private cloud signify transform the internal infrastructure using technologies such as virtualization to deliver services to request, more simply and faster. Eucalyptus, Open Nebula and Open Stack are examples of solution of the implementation of private cloud. 3) Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources. It allows one to extend either
Cloud computing security is a set of control based technologies and policies that must follow certain rules in order to protect applications, data and any information associated with cloud computing. It is known to provide excellent services but is still not supported by organizations due to privacy issues that includes security and privacy protection. As they obstruct the managers as well as the
Hybrid Clouds - Hybrid Clouds are a combination of multiple public and private clouds. They provide a complexity to distribute applications across both types of clouds. This allows obtaining a maximum of cost reduction while giving the ability to
Cloud computing, in its most basic form, is “using computer services [such as computer and data storage, management and processing] that are delivered over a network” (Kim & Solomon, 2013, p. 189). For example, an organization may require a great deal of storage for their data but may not want to purchase the servers, the physical space for the servers, or the personnel to manage the infrastructure. Instead, they take advantage of the many cloud computing options and outsource their needs, hiring someone to do everything off-site usually with the goal of reducing their overall cost of ownership. As defined by the National Institute of Standards and Technology (NIST), cloud computing has five essential characteristics, three service models, and four deployment models (Mell & Grance, 2011) which will be covered, briefly, in the next few sections.
Several years after the emergence of cloud computing, most of people still confuse with its concept because different research institutes defined the term differently. With the development of cloud computing, its concept evolves gradually in years. According to the Wikipedia, the most recent definition of cloud computing is “the delivery of services of the computing a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).” Cloud computing, in one word, was termed as the many different types of virtualized applications and services that are moved into the “cloud” – a metaphor for the internet. Cloud computing providers maintain and control physical servers, and data is processed in the “cloud” provider’s environment which also delivers hosted services. For the user, the entire computing infrastructures virtually reside “in the cloud.” In many cases, devices that used to access these services and
Cloud computing is becoming very popular amongst private users as well as business sectors due to its benefits of availability, time saving and cheaper. However, one of the biggest factors which hold back the users is Security and Reliability of the data. The report briefly describes cloud computing, its characteristics, and its three major categories. It discusses about the reliability of data in cloud computing. The report also discusses about the NoSQL database of the Cloud Service Provider giants like Google, Amazon, and Apache and how they ensure reliability of the data in their services. Finally, the report discusses about the data security in the cloud computing infrastructure. It throws light on the security of data at various levels like Network Transport Security, Data Storage Security, and Data Management Security.
When using ordinary computing, we install software programs on computer and update the hardware as per our requirements. Documents we create or save are stored in our computer. Documents are accessible on our own network, but they can’t be accessed by computers outside the network. Cloud computing, the software programs aren’t run from one’s personal computer, but are rather stored on servers accessed via the Internet. Cloud Computing provides resources and capabilities of Information Technology such as SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service),HaaS (Hardware as a Service) to distribute the powerful computing capacity to end-users. However, still there exist many problems in cloud computing today, the current researchers or practitioners pointing that data security and privacy risks have become the
Cloud computing can assist organisations improve the creation and delivery of IT solutions by allowing them to access services more flexibly and cost effectively. In public cloud computing, services are delivered by a third party to its external customers. In private cloud computing, IT provides services to internal customers.
To make it simple, cloud computing is a system for users store and access data or programs over the internet instead of individual hard drive. This cloud system is composed of three parts in terms of four important features, several service models and development models, details of those components will be explained in this report.
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Infrastructure as a Service like Amazon Web services provides virtual server instances with unique IP addresses and blocks of storage on demand. Customers use the providers application program interface(API) to start, stop, access and configure their virtual servers and storage. In the enterprise, cloud computing allows a company to pay for only as much capacity as needed and bring as soon as more is required.
Public cloud/outer cloud: This model permits cloud environment as straightforwardly or publically available. Open cloud is off reason in which different endeavors can be utilized to convey the administrations to clients by taking it from outsider. Private cloud/inside cloud: This model alluded to on-reason cloud, which is overseen or claimed by an association to give the abnormal state control over cloud administrations and base. At the end of the day private cloud is assemble particularly to give the administrations inside of an association for keeping up the security and protection. Hybrid cloud/virtual private cloud demonstrate: This model traded off both private and open cloud models where distributed computing environment is facilitated and oversaw by third get-together (off-reason) however some committed assets are secretly utilized just by an association. Community model: It permits the distributed computing environment, which is shared or oversaw by number of related associations.
Infrastructure as a service in which users runs their own systems include OS on a cloud provider infrastructure. Eg.,Amazon web service etc.,
Cloud Computing is one of the emerging technologies which now represent a reality and a low-cost computing power resource which has gained popularity among all business categories, especially medium and small size, governmental or medical organizations, as more people are realizing the power and benefits of cloud environments. Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Clouds can be classified as public, private or hybrid
Cloud computing have revolutionized life as we know it; it allows people to store, manage, and access their data by using a network of remote servers which are hosted on the internet rather than using a local server or own hardware. A recent study conducted by KPMG found that 81% of businesses were either evaluating cloud services, planned a cloud implementation or had already implemented a cloud strategy [1]. Organizations tend to use the cloud to reduce costs and improve efficiency. Cloud is not a commodity, some people think that it comes out of the sky, while in fact it comes from physical hardware inside brick and mortar facilities which are connected to hundreds of miles by networking cables.
This technology named as Cloud Technology or Cloud Computing was just a buzzword during the early 2010 but became more prominent and was widely adopted by 2012.Internet in other terms can be termed as a “cloud”. There are two words that define Cloud computing the most: Web Applications. Any organization using huge clusters of computers which require high performance through the host of services available use cloud computing. [1, 2]