Cloud Computing appears as a computational paradigm as well as distribution architecture and its main objective is to Provide secure, quick, convenient data storage and net computing device, with all computing resource visu-alized as service ,with all computing resources visualized as service and delivery over the internet [1,2].The cloud enhances collaboration, agility, scalability, availability, ability to adapt to fluctuations according to demand, accelerate development work, and provides potential for cost reduction through optimized and efficient compu-ting [3,5].Cloud computing is buzz word of IT industry today and present everywhere and every one's mind. Cloud computing is ubiquitous, next generation's infor-mation technology architecture which offers on-demand access to the network. It is dynamic, virtualized, scalable and pay per use model over internet. Cloud computing is a box of several concepts such as virtualization, Service oriented architecture (SOA), web 2.0 and many more. In some respects, Cloud Computing represents the maturing of these technologies and is a marketing term to repre-sent that maturity and the services they provide [4].There are several advantages of adopting cloud computing but still journey of cloud is not easy. Cloud still is its early stage, suffering from many pitfalls and one of the most concern is security along with availability, privacy and compliance. Traditional security mechanism such as Authentication , authorization ,
This research paper clearly explains the concepts of what is cloud computing and its evolution and components of clouds in which it categorizes. Models are included in the cloud computing these are also explained in the paper and also more benefits occurs in cloud computing. Security is very important when the sensitive data is lying in cloud and the risks to the cloud are enormous. The important points to be considered when a corporate organization is planning to move its data and applications to the cloud computing are Restricted user access, Regulatory compliance, Data Position, Data Separation, Recovery, Support, Long-term viability. Some Future aspects are also discussed in order to manipulate the present environment.
Cloud computing is innovative which uses well advanced computational power resource and gigantic improvement in storage capabilities, Cloud is the long dreamed vision of computing utilities, which helps in enable ling the sharing of
Cloud computing can be viewed as one of the most rapidly growing and evolving paradigm.Webmail,online storage and online documents are most famous examples in which customers can access their data via web browsers on the internet. The original idea of the cloud computing was delivered by J.C.R Licklider in sixties (Mohamed 2009). Cloud computing has developed since then and started to server the publics after internet offered a significant bandwidth in the nineties (Mohamed 2009). Cloud computing has been through many different phases and is still rapidly evolving.
Cloud computing is a new paradigm in the computer virtualization. It has transformed the technology and business and its use is growing rapidly. Unlike traditional system, where services are hosted at physical location, cloud computing offers a virtualized shared machine in a web based environment. Cloud computing has three types of service models and four
Cloud computing combines a number of computing concepts and technologies in objective to provide secure, quick, convenient data storage and net computing service with all computing resources visualized as services and delivered over the internet. Cloud computing has brought financial benefits and promises to many business and organizations a way to enhance their information technology such as collaboration, agility, scalability and availability without heavy upfront capital costs in servers meanwhile achieving minimal management effort for service providers.
Cloud Computing provide enterprises and users with varieties of capabilities for store and process data in the data centers of third-party. It depends on resources sharing to carry out accordance and economies of scale, like a utility over a network. The basic of Cloud Computing is the extended concept of sharing services and aggregate infrastructure. It is the product of evolution and using current exponents and technologies.
By 2020, Forbes (McKendrick, 2012) has estimated that the cloud market will be worth $270 billion; this suggests that the market is expanding rapidly and users are becoming more aware of this feature. Many people, though, still ponder over the exact purpose of cloud computing: Cloud computing is a group of offline servers that are networked together to allow data to be stored centrally. For example, Drop box is an established cloud storage company that allows users to store documents, images and videos on their servers. This type of cloud computing is known as ‘Software-as-a-Service’, which are business applications that are hosted by the provider and delivered as a service (Hurwitz, 2010). Hurwitz also mentions two other types of cloud computing: ‘Platform as a Service (PaaS)’ and ‘Infrastructure as a Service (IaaS)’. ‘Platform as a service’ is where the consumer will create an application, using tools and software from the provider, then the provider will administer the consumer with networks, storage and servers. ‘Infrastructure’ as a service is where the provider will provide the consumer with physical computer or virtual machine.
Cloud computing emerge as a computational prototype as well as a sharing architecture and its main intention is to provide secure, quick, convenient data storage and net computing services and dispatched all
Cloud Computing is an advanced paradigm with a lot of advantages, but its distinct features also create privacy and security issues. Cloud computing provides service model which is more efficient technology for business support. Cloud computing is in fact a service based approach which has changed almost every aspect of computing technologies. There are many threats to the cloud computing including security vulnerabilities and privacy issues.
Recently, Cloud technology has turn out to be a huge buzzword, and with good reason. The cloud already creates remarkable value for clients and businesses by making the digital world simpler, faster, more powerful, and more efficient. In addition to bringing valued Internet-based services and applications, the cloud can provide a more
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing security is combination of control-based technologies like network security, pc security, info security and policies designed to bind the restrictive compliance rules. It 's primarily wont to shield info, knowledge applications and infrastructure related to cloud computing use. The zoom in field of “cloud computing” has multiplied severe security issues like securing knowledge, and examining the use of cloud by the cloud computing vendors. the most plan is to spot the foremost dangerous security threats in cloud computing, which is able to alter each finish users and vendors to grasp concerning the key security threats related to cloud computing and to resolve the safety problems victimization totally different security models.
Cloud technology innovation is emerging as one of the most popular issue for most IT practitioners and cloud computing is thought of as the future trend of development of the IT industry. According to Stanoevska (2010), enterprises should have an IT infrastructure that can reform itself rapidly to new business priorities. Cloud computing technologies, such as Cloud mail, Cloud platform and Cloud software services, provide an efficient work platform for enterprises. At the same time, Carling (2011) puts forward potential problematic issues in terms of the security of cloud computing. The future of enterprise cloud computing becomes increasingly controversial. Nevertheless, enterprises should base their future framework for Information and
The Cloud Computing refers to “Computing over the Internet”.It came from Grid,utility and web services.It is a combination of network,servers,storage ,operating system and virtualization technologies to form a shared infrastructure that enables web-based value added services.End users access cloud-based applications through a web browser or a light-weight desktop or mobile application.The business software and user 's data are stored on servers at a remote location. The cloud model comprises five
“Cloud computing” simply means “Internet computing “, generally the internet is seen as collection of clouds; thus the word cloud computing can be defined as utilizing the internet to provide technology enabled services to the people and organizations[1]. Cloud computing is a powerful emerging service that provides an optimized and efficient computing platform by using sharing and virtualization concepts and improving availability, scalability, collaboration and agility for users and enterprises [2]. Cloud computing has a rapid growth in IT industries due to the considerable benefits of sorting and maintaining resources in unlimited storages with the most cost efficient method, business continuity and scalability [3]. However, the only hurdle in wide adoption of this newfound technology is lack of security especially in data protection, authentication, and data transmission subject [4].