The topic of the cloud computing industry and security is broad with far reaching intricacies. Therefore, to narrow the subject, the definition of cloud computing as defined by the National Institute of Standards and Technology (NIST) (NIST Special Publication 800-145, 2011) will be used as the foundation for this study. The NIST adopted the (Mell & Grance, 2010) cloud computing definition in 2011. (Mell & Grance, (2010)) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service-provider interaction (Mell & Grance, (2010)).
On the day of August 31, 2014, nearly 200 private celebrity pictures of various individuals, mostly female and all very personal were posted online. They were taken from personal, private cloud storage systems. They thought their personal information was safe, stored by trusted manufacturing giant Apple Inc. in their iCloud service (Kedmey, 2014). There is no such thing as safe when storing private data in a cloud environment. Individuals and corporations place a great deal of trust in cloud technology. Every day financial information, photos, plans and personal information is poured into virtual accounts stored in places unknown by people unknown. A great and ever-present threat is posed by unscrupulous thieves that stand ready to take advantage of the trust in these accounts. Research suggests the cloud is dangerous to IT security because physical ownership exists outside user control, it is vulnerable to hacking, and has no clearly defined security standards.
In 2008, the economist published a little supplement that went out with their magazine, that started to introduce with a concept of something called cloud computing. They put this quote up as part of that “The rise of the cloud will transform the Information Technology (IT) industry, but it will also profoundly change the way people work and companies operate” (The Economist, Oct 2008). Now 8 years later, the above quote is still relevant when we talk about cloud computing and what a cloud can do. The reason why it is important to still use this quote is that this is presence but we don’t yet appreciate quite how disruptive or transformative cloud computing is going to be for companies, individuals and for society. If we consider
Today, the cloud computing Service business sector is genuinely soaked, offering organisations and customers an extensive variety of services to pick between. So, choosing the right cloud services to trust with your essential applications, sensitive information, and to build successful system will be hard. Mostly small organisations and new organisations can think that it’s nearly difficult to make up minds for Cloud technology as many don 't know how to pick the right Cloud Service supplier. Here are few elements to consider to separate the right Cloud service supplier from others.
: Cloud computing is the well-known model used for storing huge amount of data over the internet and provides the convenient mechanisms to access the information. Since it is keeping up enormous measures of assets, its protection and security are the major issues. The cloud administration suppliers are not trusted and unethical, so information is to be secured. Still, some information might be accessible that the data proprietor does not wish for progress data to the cloud unless query confidentiality and data privacy are assured. On the other hand, protected query processing services have to grant efficient query processing and drastically reduce the internal workload to fully understand the benefits. “Random space perturbation (RASP) processing” method provides security and various query processing services to provide confidentiality in the cloud. The (K-Nearest Neighbour) KNN-R algorithm is used here to convert the range query to the KNN query. Users have been certified by using the randomly generated key value provided by the administrator subsequent to successful registration by the client thus maintaining privacy. Queries from users are retrieved within the least period of time i.e., less than a second. In future using RASP statistics and KNN queries to investigate supplementary applications of RASP perturbation for protected data concentrated computing in the cloud.
The cloud is a network of servers, each with a different function. In the last five years, the cloud has introduced new ways of managing data; however it has made leaps and strides since it was first thought of. The idea of cloud computing stems from many people, however, Professor John McCarthy of MIT and Dr. J.C.R. Licklider are given credit for developing the concept. The history of the cloud dates back to the1950s. Back then, high-performance computers called mainframes were used. Mainframes were very large computers that took up entire rooms. Mainframe computers were also expensive. Because of this, organizations could not afford to purchase a new mainframe for each individual in their company. As a response, “time sharing” methods
Recipients of instantaneous access to data anywhere, anytime, at any online terminal, are known as cloud users, as the avenue for experiencing these luxuries is cloud computing. This can be achieved by using free services such as Drive offered by Google, or iCloud from Apple, or via OneDrive from Microsoft. Much like a music library on a personal computer cloud computing stores data, all the while making it accessible everywhere. Instead of having to be at a physical machine to access the data, one can place this data into a cloud that can be accessed anytime, online, when they feel like it. Even more so this is great in everyday life scenarios. For instance, one can take photos from their iPhone on a day hike in the
Cloud computing has become the most common phenomenon in the recent years. More and more cloud services have flourished all around the world such as computing resource, storage space outsourcing and different kinds of software applications. For many reasons like low cost, efficiency, convenience, better connectivity and etc., user often stores his data on remote servers. Since more servers are public, there exist a lot of risks for the data in the transition process, the user ensures the privacy of his data by storing it in encrypted form, then he can search the encrypted data and retrieve it. The first effort of searching encrypted data by keyword was tackled by Song, Wagner and Perrig cite{s1}. To securely search over encrypted data, searchable encryption schemes have been proposed in recent years cite{b2,b3,b5,c2,c4,g1,w2}, which can be divided into two schemes: symmetric searchable encryption (SSE) and asymmetric searchable encryption (ASE). To perform a search on a dataset, an user creates an index of keywords listed in the documents and later on executes the search on the index in a way that allows the server to retrieve the documents contain a certain keyword instead of retrieving all the encrypted documents back which is fully impractical solution in cloud computing scenarios. Recent refinements and extensions to this scheme are given in cite{g1, w2}.
Cloud computing can be defined as a model for enabling pervasive, convenient, on-demand network access provided to users to provide a shared pool of configurable computing resources. Networks, Storage, services, and applications make a part of these network sources. (Mell & Grance, 2011). In general terms, cloud computing can be stated as the process by which the users with the help of a web browser over the internet can remotely access data and program applications. A few characteristics of cloud computing are:
Could computing is a new technology, which is receiving a lot of attention from businesses and information technology companies. Cloud computing involves the subscribing services and obtaining a network based storage space as well as computer resources over the Internet. Basically, cloud computing is the delivery of computing resources over the Internet. It gives people and businesses an opportunity to make use of hardware and software that are under the control and management of third party companies located in remote locations. Some of the examples of cloud services are webmail services such as Yahoo and Gmail, online business applications, online file storage and social networking sites. The cloud computing technology enables companies to access information and other computer resources from any part where a network connection is available. The technology provides a pool of resources that are shared. The pool of resources includes networks, data storage space, and computer processing power and customized user and corporate applications.
Information can be in a physical or electronic form. When it is stored in computer it is called as Data. Collection of processed data then called as Information. Information Management is a methodical approach of managing information using technology to collect, process and concise information. These days we have lot of information available stored in different formats and places. The rise of social media, smartphones and tablets are creating urgent information management in the IT industry. Unfortunately, most organisations do not have good IT infrastructure to deal with large amount of data and as result IT professionals are under pressure to upgrade the infrastructure, processes and technology to meet the demand of the growing information with efficient management. For many organisations, the answer to the above challenges can be found in the Cloud.
Cloud computing, as defined by wikipedia, creates a virtual computer, which is anonymous and is networked to a series of servers across the globe, known as the “cloud”. The “cloud” harnesses underutilized processing power of all computers in a network, to create supercomputing power . By connecting networks of large groups of servers, that run low cost consumer PC technology, a shared IT infrastructure (the “cloud”) is created. Thus rather than storing applications, databases, emails and file services on a personal computer or server, a business or an individual can store in the “cloud”. In cloud computing the user rents server space or access to software from a cloud service provider and connects over the internet. There are four models of cloud computing. Firstly, a private cloud where services and infrastructure are maintained and managed by the customer/user. Secondly, a community cloud whereby several organisations share access to a private cloud. Thirdly, a public cloud where services are stored off site and accessed over the internet. The storage is managed by an external organisation like Google or Microsoft. Finally, the hybrid cloud which uses both private and public cloud models. Cloud services include SaaS (software as a service) where the vendor uses the web to deliver applications; cloud platform services (PaaS) to develop or customise cloud components of software; cloud infrastructure services (Iaas) which are self serve models for managing remote data
To make it simple, cloud computing is a system for users store and access data or programs over the internet instead of individual hard drive. This cloud system is composed of three parts in terms of four important features, several service models and development models, details of those components will be explained in this report.
Abstract—The cloud computing technology is considered as a very promising internet based computing platform, resources it provides to create virtual machines are rarely used to achieve security. Cloud Researchers worked on providing solution, in order to offer new security services based on Cloud paradigm to manage with threats such as DDoS (Distributed Denial of Service) attacks, using extensible resources and other cloud’s characteristics. Our model is based on the SaaS (Security as a Service) to manage security using specialized virtual firewalls proposed as a service by the cloud provider. The main advantage of this approach is to instantiate firewalls when needed and adapt resources to filter the networks flow avoiding bottleneck and
The cloud is a data storage method that stores information on the iInternet rather than in a secure facility. Cloud data revolutionized the way companies store their information by making it easier to organize files from any location —, not just the office desktop. Suddenly CEO’s could work from Bermuda, having access to every file on the go.