The Cloud Of Cloud Computing

Better Essays
Abstract—The cloud computing technology is considered as a very promising internet based computing platform, resources it provides to create virtual machines are rarely used to achieve security. Cloud Researchers worked on providing solution, in order to offer new security services based on Cloud paradigm to manage with threats such as DDoS (Distributed Denial of Service) attacks, using extensible resources and other cloud’s characteristics. Our model is based on the SaaS (Security as a Service) to manage security using specialized virtual firewalls proposed as a service by the cloud provider. The main advantage of this approach is to instantiate firewalls when needed and adapt resources to filter the networks flow avoiding bottleneck and…show more content…
INTRODUCTION Cloud computing is a mixture of distributed system, utility computing and grid computing. In cloud computing, use combination of all these three in virtualized manner. Cloud computing converts desktop computing into service based computing using server cluster and huge databases at data center. Cloud computing gives innovative facility like on demand, pay per use, dynamically scalable and efficient provisioning of resources. Cloud computing the new developed technology of distributed computing systems changed the phase of entire business over internet and set a new trend. The dream of Software as a Service becomes true; Cloud offers Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Providing the basics of Cloud Computing is not part of this paper, for basic knowledge go through. There are more chance of attacks in cloud computing. As cloud computing mainly provides three types of services so in each layer have some soft corners which invite attackers to attack. Cloud computing providing services to its consumers at abstract level and take care of all the internal complex tasks. With cloud computing consumer life became easy. But “as the nature rule with growth in facility vulnerability also increases”. The same concept applies in cloud computing also, it provides the facility to consumers in the same way it provides facility to attackers also. There
Get Access