Review of Literature Cloud Computing Definition The topic of the cloud computing industry and security is broad with far reaching intricacies. Therefore, to narrow the subject, the definition of cloud computing as defined by the National Institute of Standards and Technology (NIST) (NIST Special Publication 800-145, 2011) will be used as the foundation for this study. The NIST adopted the (Mell & Grance, 2010) cloud computing definition in 2011. (Mell & Grance, (2010)) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service-provider interaction (Mell & Grance, (2010)). Cloud Computing Timeline The cloud computing industry evolved over the past fifteen years and according to (White, 2013) in the article, “A Cloud Retrospective”, the cloud industry was introduced out of the dot.com bubble burst at the beginning of the twenty-first century compelled internet-based companies to modernize their Information Technology (IT) Architecture and find more efficient IT operating solutions (White, 2013). (White, 2013), writes that Amazon entered the cloud market by introducing its Amazon Web Services (AWS) in 2006. (White, 2013) states in 2007 there were disagreements by the experts on the true definition of cloud computing. In 2008 the cloud market expands to include more vendors (White, 2013). (White, 2013)
Cloud computing is a new technology that comes with both benefits and drawbacks and like any new tech it can be used to great success when paired with steps to mitigate the security issues it raises. Cloud computing has become somewhat of an ambiguous term often having different meaning for different people. An article in InfoWorld (2013) stated, ”Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any
Cloud computing has set a trend in the information technology arena that has sparked the interest of all who utilize the internet on purpose and unsuspectingly. Initially, the primary purpose of cloud computing was to provide a centralized data bank that organizations could use for quick data access. Its use has been quickly adapted, however, beyond business use to become the first option for personal use. The advantages and disadvantages of implementing such a shift from business to personal are varied, yet, statistically, according to the CISCO Global Cloud Index: Forecast and Methodology, 2014-2019 White Paper, its public use is on the rise. The report notes that “by 2019, 56 percent of the cloud workloads will be in public cloud data centers, up from 30 percent in 2014 and by 2019, 44 percent of the cloud workloads will be in private cloud data centers, down from 70 percent in 2014”. Though disadvantages with regard to data security is prominent, users have deemed that its implementation will still promote greater benefits than loss.
Cloud computing is able to offer a distinct advantage to companies willing to move into this growing arena. This is not without its drawbacks. Even in the definition of Cloud Computing by the National Institute of Standards and Technology, (NIST) clear advantages exist. The definition includes the following terms: on demand self-service, ubiquitous network access, location independent resource pooling, rapid elasticity and measured service.
According to Prasad, Gyani and Murti (2012), “Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet” (p.7). This statement is from five years ago, and although cloud computing is no longer considered new, this definition still describes what cloud computing means today. Cloud computing being private or public is becoming more primordial in the IT sector due to the numerous advantages it gives to its end users (Basmadjian et al. 2012). Since the interest in cloud computing keeps on increasing, efforts need to continue to evaluate current trends in security and privacy. Cloud computing
This paper intends to research Cloud Computing adoption and talks about the drivers and inhibitors of its appropriation. More over an endeavor has been made to distinguish the key partners of distributed computing and layout the present security challenges. At last, the paper closes with some further research regions in the field of distributed computing.
Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data storage and processing to software, such as email handling, are now available instantly, commitment-free and on-demand. Since we are in a time of belt-tightening, this new economic model for computing has found fertile ground and is seeing massive global investment. According to IDC’s analysis, the worldwide forecast for cloud services in 2009 will be in the order of $17.4bn1. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6,005m in 2013 2. The key conclusion of ENISA’s 2009 paper on Cloud
Reaching the point where computing functions as a utility has great potential, promising innovations we cannot yet imagine. Customers are both excited and nervous at the prospects of Cloud Computing. They are excited by the opportunities to reduce capital costs. They are excited for a chance to divest themselves of infrastructure management, and focus on core competencies. Most of all, they are excited by the agility offered by the on-demand provisioning of computing and the ability to align information technology with business strategies and needs more readily. However, customers are also very concerned about the risks of Cloud Computing if not properly secured, and the loss of direct control over systems for which they are nonetheless accountable. To aid both cloud customers and cloud providers, CSA developed “Security Guidance for Critical Areas in Cloud Computing”, initially released in April 2009, and revised in December 2009. This guidance has quickly become the industry standard catalogue of best
In the beginning a lot of talks were about what is the cloud? What does it do? What does it mean to us? Etc. But now the talks started to change and people are really thinking about how they can leverage the cloud, how they can use cloud as delivery model which is more efficient, how can they get services out faster, how can they use cloud with social media, with mobile, with data analytics. This period we are in a flexion point where we have really started using the cloud for advantage. When people want to talk about cloud computing the first thing they want to talk about is how they can save money in their IT environment and the reason is that they want to use the funds to drive innovation into delivering new applications and services instead of servicing the existing infrastructure. This is an opportunity to change the story of IT from tremendous cost. Instead of spending sixty, seventy or eighty percentage on maintaining the existing systems, organizations can flip the economic equation. A good example of how cloud allows businesses to grow is the telecommunication industry. The telecommunication industry have tremendous capacity, they have tremendous adjacency to clients and the cloud offers them the ability to bring new services to their clients more quickly, more efficiently and
Cloud computing is a topic of which much is assumed. The average person recognizes the term “cloud computing” as having to do with their storage from their iPad or iPhone on the online storage area which syncs their Apple devices to their computer. This common cloud is called the iCloud. That is where common knowledge ends about this topic. However, upon further exploration, a deeper understanding is gained with greater explanation, and it is realized that cloud computing is something that is used all of the time on many levels of everyday technology. While the terminology remains cryptic to the mind of most people, the concepts behind the practical uses of cloud computing become quite clear. It is relatable and understandable. Upon this revelation, the iCloud is recognized as the tip of the preverbal iceberg when speaking about cloud computing. It is important to discuss and further understand the many types of cloud computing as well as the various applications to life through technology. This affects how information is stored online, computers are protected, information is secured, emails are processed, and many other factors that are taken for granted in the world of technology. Cloud computing is a general term used to describe how information is stored, utilized, and accessed over the internet. There is no cloud, but the word cloud gives the connotation of an abstract place which is known to exist but is too vast to touch or contain (Griffith,
Cloud computing has become the most common phenomenon in the recent years. More and more cloud services have flourished all around the world such as computing resource, storage space outsourcing and different kinds of software applications. For many reasons like low cost, efficiency, convenience, better connectivity and etc., user often stores his data on remote servers. Since more servers are public, there exist a lot of risks for the data in the transition process, the user ensures the privacy of his data by storing it in encrypted form, then he can search the encrypted data and retrieve it. The first effort of searching encrypted data by keyword was tackled by Song, Wagner and Perrig cite{s1}. To securely search over encrypted data, searchable encryption schemes have been proposed in recent years cite{b2,b3,b5,c2,c4,g1,w2}, which can be divided into two schemes: symmetric searchable encryption (SSE) and asymmetric searchable encryption (ASE). To perform a search on a dataset, an user creates an index of keywords listed in the documents and later on executes the search on the index in a way that allows the server to retrieve the documents contain a certain keyword instead of retrieving all the encrypted documents back which is fully impractical solution in cloud computing scenarios. Recent refinements and extensions to this scheme are given in cite{g1, w2}.
Information can be in a physical or electronic form. When it is stored in computer it is called as Data. Collection of processed data then called as Information. Information Management is a methodical approach of managing information using technology to collect, process and concise information. These days we have lot of information available stored in different formats and places. The rise of social media, smartphones and tablets are creating urgent information management in the IT industry. Unfortunately, most organisations do not have good IT infrastructure to deal with large amount of data and as result IT professionals are under pressure to upgrade the infrastructure, processes and technology to meet the demand of the growing information with efficient management. For many organisations, the answer to the above challenges can be found in the Cloud.
The previous chapter demonstrated the key fundamentals of the research and an introduction to the concept of Cloud Computing. Even though a lot of research work has been done on the subject of cloud computing, the field is still a relatively new academic field. The National Institute of standards has established the standards related to Cloud computing and the research into the subject continues, especially with new tools and technology infrastructure that continues to evolve at a very fast pace.
Cloud computing programs, or the ideas of them, have been around since the 1960s, but it was not until the 1990s that the services were finally available due to advancements in technology. But to fully understand the importance of this innovation we must define what cloud computing is. Per the National Institute of Standards and Technology, an agency that creates standards and guidelines for providing information security for all agency operations and assets has defined cloud computing as a model that have easy access to a pool of shared network. Cloud computing programs must have the following five characteristics to be defined as such: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Once the program satisfies these five elements in can meet one of three service models: Software as a Service, Platform as a service, and Infrastructure as a Service and one of four development models: private cloud, community cloud, public cloud, and hybrid cloud. For the sake of this paper we will focus on Software as a Service (Grance, 2011, 2-3).
We have all been touched in some way shape or form by the cloud. The history of the cloud dates back as far as the 1950s. Back then, a mainframe was so big it took up an entire room. It required a massive amount of space, and electricity which generated superb amounts of heat. These computers were standalone, meaning that the data was held solely with that device. In response, they developed "time sharing" methods, which allowed multiple users to share access to data and CPU time. Nowadays, this concept of “time sharing" is the premise of cloud computing. The next major event in cloud computing history occurred in 1969, when J.C.R. Licklider developed the Advanced Research Projects Agency Network (ARPANET). His desire was that someday all
There is no conciseness in the industry for a generally accepted definition of cloud computing. “There is a clear consensus that there is no real consensus on what cloud computing is” (Irving Wladawsky Berger,IBM).