Conference Paper

Challenges and Issues within Cloud Computing Technology

If you want to read the PDF, try requesting it from the authors.

Abstract

Abstract-Cloud computing refers to an emerging computing model where machines in large data centres can be used to deliver services in a scalable manner. It has become popular for corporations in need of inexpensive, large scale computing. Organizations and government agencies increasingly utilise cloud computing architectures, platforms and applications to deliver services and meet the needs of their clients. There are many challenges and issues such as privacy, security and trust that can have major impacts on the information and services supported by this technology. This paper summarises the technology background and discusses challenges and issues that can arise by the use of cloud computing in organizations and government agencies.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Security ensures only legitimate users gets access to sensitive data and privacy refers to who is allowed to access data, while confidentiality refers to the privacy and security of the data. All of these are critical concerns for organizations [9]. The challenges and issues that emerge while implementing cloud computing in the public sector that include security issues such as access, availability and backup, control over data lifecycle and audit [9,10]. ...
... All of these are critical concerns for organizations [9]. The challenges and issues that emerge while implementing cloud computing in the public sector that include security issues such as access, availability and backup, control over data lifecycle and audit [9,10]. There are privacy issues such as lack of user control; unauthorized secondary usage; and trans-border data flow and data proliferation [9,10,11] and trust is a significant issue [10].Confidentiality and integrity of data present in the cloud are related to the identity management in cloud computing. ...
... The challenges and issues that emerge while implementing cloud computing in the public sector that include security issues such as access, availability and backup, control over data lifecycle and audit [9,10]. There are privacy issues such as lack of user control; unauthorized secondary usage; and trans-border data flow and data proliferation [9,10,11] and trust is a significant issue [10].Confidentiality and integrity of data present in the cloud are related to the identity management in cloud computing. It is necessary to keep record of identity of the user and regulating unauthorized access to the services [12]. ...
... All of these are critical concerns for organizations [9]. The challenges and issues that emerge while implementing cloud computing in the public sector that include security issues such as access, availability and backup, control over data lifecycle, and audit [10,11]. There are privacy issues such as lack of user control, unauthorized secondary usage, and trans-border data flow and data proliferation [10][11][12]; and trust is a significant issue [13]. ...
... The challenges and issues that emerge while implementing cloud computing in the public sector that include security issues such as access, availability and backup, control over data lifecycle, and audit [10,11]. There are privacy issues such as lack of user control, unauthorized secondary usage, and trans-border data flow and data proliferation [10][11][12]; and trust is a significant issue [13]. Confidentiality and integrity of data present in the cloud are related to the identity management in the cloud environment. ...
Article
Full-text available
Identity theft is the most recurrent twenty-first century cybercrime. Thus, authentication is of utmost significance as the number of hackers who seek to intrigue into legitimate user’s account to obtain sensitive information is increasing. Identity based authentication operates to corroborate the identity of the user so that only the legitimate user gets access to the service. This paper proposes a quantum identity based authentication and key agreement scheme for cloud server architecture. Quantum cryptography based on the laws of quantum physics is a vital technology for securing privacy and confidentiality in the field of network security. A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme. The security analysis of the proposed protocol proves that it is robust against all security attacks. To confirm applicability of quantum key distribution in cloud computing, a practical long-distance entanglement-based QKD experiment has been proposed. This experiment confirms successful generation of shifted keys over distance of 100 km of optical fiber with a key rate of 4.11 bit/s and an error rate of 9.21 %.
... Cloud services can be classified into three delivery/service models: IaaS, PaaS, SaaS. There are also four models in cloud computing: private, public, hybrid, and community [9]. ...
Article
Full-text available
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. Cloud computing has many of its supporting technologies (virtualization, Web 2.0, service-oriented architecture), which inherits many security issues and makes them susceptible to attacks. Most of the previous work focused on storing data in the cloud without taking security issues and attacks into consideration. In this paper, we provide an analysis of security issues in cloud storage and possible solutions. With regard to the attacks on the data stored in the clouds, parametric comparison including all the details and countermeasures are provided. Finally, this paper provides a significant contribution to building a secure cloud environment for data storage, its privacy and recovery in disaster situations.
... The cloud models available are Private Cloud, Public Cloud, Community Cloud and Hybrid Cloud. The three major cloud service models are Software as Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) (Cloud Security Alliance,2009;Dustin et al.,2010 ;Ali et al.,2014;Mell et al.,2009). Enterprises are realigning their IT scene to receive cloud computing. ...
Article
Full-text available
This study intends to analyse the reception of Cloud Computing in Indian health care centres and to explore the components that effect the adoption of cloud computing. There are various factors that affect the cloud computing adoption. Health care sector need to methodically assess these variables before moving to cloud. The research model was developed to find out the determinants influencing the acceptance of cloud computing in private hospitals. The Diffusion of Innovation (DOI) theory's innovation characteristic and Technology-Organization-Environment (TOE) framework was integrated to conceptualize the research model. Empirical data was collected from 189 respondents working in private hospitals in India who had experience in Information technology usage and implementation. The structural equation modelling used the sample data to test against the proposed research model. It will also find out cloud computing adoption determinants in private hospitals.
... Information Technology (IT) has been adding significant benefits to various aspects of people's life, either in terms of convenience or comfort or entertainment [1]. In other side, the present competitive environment, companies are wondering how to reduce their IT costs while increasing their efficiency and agility to react when changes in the business processes are required. ...
Article
The topic of ''the cloud'' has attracted significant attention throughout the past few years. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Cloud Adoption in Oil & Gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy companies have carefully weighed whether they should opt for a public cloud versus a private one, and which applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic purposes. Generic business functions like payroll process and procurement are being run through the cloud, along with customer relationship management, likely through software-as-a-service offerings that have become well-known. Security is as much of an issue in the cloud as it is anywhere else. Different people share different point of view on cloud computing. Some believe it is unsafe to use cloud. Cloud vendors go out of their way to ensure security. This paper aims to understand the effects of security and privacy concerns on educational use of cloud services. This proposed a research model based on Ajzen's (1991) Theory of Planned Behavior (TPB). Following the TPB, the research developed a model, which posits that staff attitudes predicted by security and privacy perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The Model was assess the based on the data collected by means of survey questionnaires. Results supported the proposed model, validating the predictive power of the TPB.
... The most widely used definition of the cloud computing model is introduced by the U.S. National Institute of Standards and Technology (NIST) as "A model for enabling ubiquitous, convenient, ondemand network access to a shared pool of services (for example, networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction" [11][12] [13]. The NIST definition promotes the availability of cloud computing and describes its five essential characteristics: ondemand self-service; broad network access; resource pooling; rapid elasticity; and measured service [11] [12] as shown in Figure (1). ...
Conference Paper
The terminology of cloud computing defines a network, which shares applications, processing power and large systems among many other computers. It can be a foundation for media channels and other applications. Cloud computing provides great opportunity for each practicing individuals to connect and extend their local computing capabilities over the global processing power. Advanced means of communication are one of the products of such computing. Cloud computing may function as a single-function application, a platform on which these applications can work, a group of services that provide numerous advantageous computing resources, and the potential to save a great quantity of data. The incorporation of cloud computing and the media processing is therefore quit natural selection for both of the areas, and therefore comes out the media cloud.
... This lag in adoption could be due to factors to challenges and issues (IT Industry Innovation Council 2011; Department of Finance and Deregulation 2011). That is, various challenges and issues relating to security, privacy, and trust (Ali & Soar 2014; Buyya et al. 2011; Ghanam et al. 2012; Kim 2009; Takabi et al. 2010). The paucity of empirical studies about the policies that need to be considered for the adoption of cloud computing in regional municipal governments has hindered understanding and strategy development to improve its adoption (IT Industry Innovation Council 2011). ...
Conference Paper
Technology plays an important role in helping organizations to maintain control and take advantage of opportunities in a highly competitive and increasingly complex business environment. Cloud computing offers access to computing power, storage, software, storage, and other services for customers and provides remote data centres through the web. This research aims to investigate the policy that required for the adoption of cloud computing. The research employed in-depth interviews with IT managers from selected local government councils in Australia. The research aims to contribute to specific policy in the adoption of cloud computing.
... Information Technology (IT) has a broad range of socioeconomic benefits [1], and enables improved services [2]. IT assists in improving effectiveness, profitability, organisational services and maximising the utilisation of assets [3] [4]. Cloud computing has attracted interest from businesses, institutions and government [5]. ...
Conference Paper
Abstract - Cloud computing is seen as an increasingly important enabler for improving productivity, efficiency and cost reduction. This research aims to explore the potential for value creation for Australian municipal governments by identifying factors that are likely to influence the adoption of cloud computing. The research model is proposed based on two theories derived from the literature: the technology-organization-environment (TOE) framework and the diffusion of innovation (DOI) model. The research employed in-depth interviews of Australian councils IT managers. This research identifies the level of importance of the key factors for the Australian local councils to make an adoption decision toward cloud computing. The main factors that were identified as playing a significant role in Australian local council’s adoption of cloud services were: relative advantage, compatibility, cost, technology readiness, competitive pressure. As for academia, this research can be provided as a useful reference for future studies in this subject field.
Conference Paper
Due to a demand for computing of huge proportions and cheap in cost, cloud computing is now a favoured model. This type of technology has been utilized by some government organizations to address the demands and requirements of their citizen. However, constraints exist with the use of this model impacting on service provision and use of this technology. This paper will explore the disparate challenges and issues that impacting on the use of cloud computing in Australian local councils. 480 IT staff from 47 local government councils was investigated. The findings will aid authorities to analyse the effectiveness of endorsing cloud computing and develop their understanding of the problematic components this may entail. This research comprises a series of findings on cloud computing with specific focus in this paper on different challenges and issues surrounding the adoption of this technology by Australian local councils.
Article
Technology plays an important role in helping organizations control quality and costs, and take advantage of opportunities in a highly competitive and increasingly complex business environment. Cloud computing offers greater access to computing power, storage, software, and remote data centres through the web. This research aims to confirm the factors to be considered for cloud computing adoption in Australian regional municipal governments. The research involved data from interviews with IT managers from selected regional municipal governments, and survey data from 480 IT staff across 47 regional municipal governments. The major factors to be considered for the adoption of cloud computing in regional municipal governments were identified as Internet connectivity, Internet speed, availability, reliability, data storage location, security, data sovereignty, cost, integration, data backup, provider dependability, employees’ knowledge, and transportability. The findings of this research may help managers increase their awareness about factors to be considered when regional municipal governments planning to adopt cloud computing.
Article
Full-text available
It is expected that computing services will increasingly be accessed as another utility a similar way to other services such as water, electricity, telephone or gas. Many organizations including government deliver their services through information and communication technology (ICT) tools including e-government. Cloud computing is a relatively new way of providing services over the internet. In this research in-depth interviews of Australian councils’ IT managers were conducted with the aim of providing insights into the perceived benefits of cloud computing adoption. Also, survey data from 480 IT staff across 47 local councils were collected to confirm the findings of the exploratory stage. The research indicated that cloud computing is seen to offer many benefits that are identified in the research literature; additional anticipated benefits emerged which related to reduced level of risk, remote access, reduce staff, and time efficiencies. The findings of this research may help IT managers and top management evaluate possible adoption by increasing their understanding about anticipated benefit which will encourage them when planning or decided to adopt cloud computing.
Article
Technology plays an important role in helping organisations control quality and costs, and take advantage of opportunities in a highly competitive and increasingly complex business environment. Cloud computing offers greater access to computing power, storage, software, and remote data centres through the web. This research aims to investigate the factors to be considered for cloud computing adoption in Australian regional councils. The research employed in-depth interviews with IT managers from selected local government councils. The major factors to be considered for the adoption of cloud computing were identified as Internet connectivity, data storage location, cost, integration, data back-up, provider dependability, employees’ knowledge, and transportability. The findings of this research may help managers increase their awareness about factors to be considered when planning to adopt cloud computing.
Article
New developments in information technology (IT) provide opportunities for a better quality of life through benefits such as increased comfort and convenience. Compared to dedicated infrastructures such as cluster and grid computing, cloud computing can better cater to users' needs by increasing effectiveness, efficiency and functionality at a potentially lower cost. This research aims to provide insights into the challenges and issues faced by implementers and users of cloud computing by comparing the extant literature about this issue with current insights provided by IT managers. A systematic literature review and in-depth interviews with IT managers in local government councils were conducted for this research. The research indicated that the factors in the extant literature were supported; additional challenges and issues emerged which are related to effective network, data storage location, availability of different service providers, policy makers, a limited understanding of the cloud and business transformation. The findings of this research are expected to assist managers to evaluate possible adoption and increase their awareness about challenges and issues that influence the cloud adoption when planning to adopt it.
Conference Paper
It is expected that computing services will increasingly be accessed as another utility a similar way to other services such as water, electricity, telephone or gas. Many organizations including government deliver their services through information and communication technology (ICT) tools including e-government. Cloud computing is a relatively new way of providing services over the internet. In this research in-depth interviews of Australian councils’ IT managers were conducted with the aim of providing insights into the perceived benefits of cloud computing adoption. The research indicated that cloud computing is seen to offer the many benefits that are identified in the research literature; additional anticipated benefits emerged which related to reduced level of risk, remote access, reduce staff, and saving time.
Article
Full-text available
Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. Public clouds are available from Google.com, Amazon.com, Microsoft, Oracle/Sun, Canonical/Eucalyptus and many other vendors. Private cloud technologies, where the cloud software is loaded on local or in-house server hardware, are available from VMware, Eucalyptus, Citrix, Microsoft, and there are thousands of vendors offering cloud solutions of all sorts. A search for private cloud hosting on Google.com produced 581,000 page results. Strong cloud security begins with the infrastructure. If the cloud system’s infrastructure is insecure, it puts the confidentiality and availability of all information used via that cloud system at risk. The infrastructure constitutes a cloud system’s first line of defense. This can be enforced by patching servers, configuring firewalls, and placing intrusion- detection systems (IDS). Security Pain Points must be identified. This paper is concerned with discovery of the vulnerabilities in the landscape of clouds, discovery of security solutions, and finding evidence that early-adopters or developers have grown more concerned with security.
Article
Full-text available
Due to widespread demand of E-governance and exponentially increasing size of data, new technologies like Open source solutions and cloud computing need to be incorporated. In this paper, the latest trends of technology that the government of most of the country has adopted have been discussed. While working on this project we have concluded that E-Governance has made the working of government more efficient and more transparent to its citizens We have also presented an exhaustive list of E-Governance projects which is currently being used in India and in international scenario. We have provided a mechanism for improving E-Governance by including technologies such as Open Source and Cloud Computing.
Article
Full-text available
Advances in service oriented architecture (SOA) have brought us close to the once imaginary vision of establishing and running a virtual business, a business in which most or all of its business functions are outsourced to online services. Cloud computing offers a realization of SOA in which IT resources are offered as services that are more affordable, flexible and attractive to businesses. In this paper, we briefly study advances in cloud computing, and discuss the benefits of using cloud services for businesses and trade-offs that they have to consider. We then present 1) a layered architecture for the virtual business, and 2) a conceptual architecture for a virtual business operating environment. We discuss the opportunities and research challenges that are ahead of us in realizing the technical components of this conceptual architecture. We conclude by giving the outlook and impact of cloud services on both large and small businesses.
Conference Paper
Full-text available
There is a growing trend of using cloud environments for ever growing storage and data processing needs. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. This paper primarily aims to highlight the major security issues existing in current cloud computing environments. We carry out a survey to investigate the security mechanisms that are enforced by major cloud service providers. We also propose a risk analysis approach that can be used by a prospective cloud service for analyzing the data security risks before putting his confidential data into a cloud computing environment.
Conference Paper
Full-text available
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
Conference Paper
Full-text available
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organizational means. This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.
Conference Paper
Full-text available
Cloud computing systems fundamentally provide ac- cess to large pools of data and computational resources through a variety of interfaces similar in spirit to exist- ing grid and HPC resource management and program- ming systems. These types of systems offer a new pro- gramming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are pro- prietary, rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. In this work, we present EUCALYPTUS - an open- source software framework for cloud computing that im- plements what is commonly referred to as Infrastructure as a Service (IaaS); systems that give users the ability to run and control entire virtual machine instances deployed across a variety physical resources. We outline the ba- sic principles of the EUCALYPTUS design, detail impor- tant operational aspects of the system, and discuss archi- tectural trade-offs that we have made in order to allow Eucalyptus to be portable, modular and simple to use on infrastructure commonly found within academic settings. Finally, we provide evidence that EUCALYPTUS enables users familiar with existing Grid and HPC systems to ex- plore new cloud computing functionality while maintain- ing access to existing, familiar application development software and Grid middle-ware.
Article
Full-text available
The Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for end-users. In this paper, we study the Cloud computing paradigm from various aspects, such as denitions, distinct features, and enabling technologies. This paper brings an introductional review on the Cloud computing and provide the state-of-the-art of Cloud computing technologies.
Article
Full-text available
Until they are certain that outsourcing IT management is the best possible option, firms would do well to maintain and invest in their own in-house IT assets.
Article
Full-text available
Our task is to adopt a multidisciplinary view of trust within and between firms, in an effort to synthesize and give insight into a fundamental construct of organizational science. We seek to identify the shared understandings of trust across disciplines, while recognizing that the divergent meanings scholars bring to the study of trust also can add value.
Article
Full-text available
Cloud Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Cloud Computing and there seems to be no consensus on what a Cloud is. On the other hand, Cloud Computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established Grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles and give insights into the essential characteristics of both.
Article
Background/Objectives: We propose a cloud based computing architecture to preserve data and privacy of the user’s location information and the interests of different intruders on service user’s data. Methods/Statistical Analysis: Data confidentiality and trust is in spike when it comes to modern cloud computing as storage and means of communication. Social Networking, usage of Location based services; cloud services offered by CSPs have become part of one’s daily life with the advent of smart phones. Findings: Location information of the user can be obtained using GPS (Global Positioning System) or RFID (Radio Frequency Identification). Hacking which the access to the data of the user is obtained. This forms two limitations, 1. Works only in GPS enabled devices. 2. If mobile devices perform such heavy computations it leads to battery depletion problem. To overcome the second limitation Mobile Cloud Computing is used. Improvements/Applications: Mobile Cloud Computing offers great computing power and storage to the mobile devices. It also increases the affordability and reliability but it is still in its budding stages in providing trust guarantees to the user.
Article
Cloud computing is an emerging computing paradigm that gives the concept of time shared remote services with attractive technological and financial advantages. The infrastructure uses new technology and services that haven't been absolutely evaluated with relevancy security. In this paper, first of all we glance into the impacts of the distinctive characteristics of cloud computing such as multi-tenancy, elasticity and third party management, upon the protection necessities. Then, we tend to analyze the cloud security necessities in terms of the elemental security problems, i.e., confidentiality, integrity, convenience, trust, and audit and compliance.
Article
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Article
Trust is a common aspiration in information and information technology (IT) security. Typical situations include those in which the intention is to sell security policies, measures, standards, and procedures as promoting security. Trust is mentioned in various lists of criteria and evaluation catalogs on secure IT products and systems as these catalogs aim to achieve reliability (access) and confidentiality (data). What is interesting here is that trust is not considered as a concept but instead in the colloquial sense (with no reflection of the ubiquity of the term) and is considered achievable with the help of technical procedures. Evaluation of IT products and systems and certification of digital signatures should, however, guarantee security that can be quantified and verified. This article explores three main theories in connection with information and IT security: Do evaluation, certification, and standardization serve in creating trust by reducing complexity in such a way that they can be understood and verified by the user?
Article
Cloud computing, which refers to an emerging computing model where machines in large data centers can be used to deliver services in a scalable manner, has become popular for corporations in need of inexpensive, large scale computing. Recently, the United States government has begun to utilize cloud computing architectures, platforms, and applications to deliver services and meet the needs of their constituents. Surrounding the use of cloud computing are many risks that can have major impacts on the information and services supported by this technology. This paper discusses the current use of cloud computing in government, and the risks–tangible and intangible–associated with its use. Examining specific cases of government cloud computing, this paper explores the level of understanding of the risks by the departments and agencies that implement this technology. This paper argues that a defined risk management program focused on cloud computing is an essential part of the government IT environment.
Article
Cloud computing, privacy, design Privacy is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. In this paper the privacy challenges that software engineers face when targeting the cloud as their production environment to offer services are assessed, and key design principles to address these are suggested. Abstract Privacy is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. In this paper the privacy challenges that software engineers face when targeting the cloud as their production environment to offer services are assessed, and key design principles to address these are suggested.
Article
Government cloud services are a new development at the intersection of electronic government and cloud computing which holds the promise of rendering government service delivery more effective and efficient. Cloud services are virtual, dynamic and potentially stateless which has triggered governments’ concern about data sovereignty. This paper explores data sovereignty in relation to government cloud services and how national strategies and international policy evolve. It concludes that for countries data sovereignty presents a legal risk which can not be adequately addressed with technology or through contractual arrangements alone. Governments therefore adopt strategies to retain exclusive jurisdiction over government information.
Chapter
The presentation “Cloud Computing: Benefits, risks and recommendations for information security” will cover some the most relevant information security implications of cloud computing from the technical, policy and legal perspective. Information security benefit and top risks will be outlined and most importantly, concrete recommendations for how to address the risks and maximise the benefits for users will be given.
Article
One of the many definitions of "cloud" is that of an infrastructure-as-a-service (IaaS) system, in which IT infrastructure is deployed in a provider's data center as virtual machines. With IaaS clouds' growing popularity, tools and technologies are emerging that can transform an organization's existing infrastructure into a private or hybrid cloud. OpenNebula is an open source, virtual infrastructure manager that deploys virtualized services on both a local pool of resources and external IaaS clouds. Haizea, a resource lease manager, can act as a scheduling back end for OpenNebula, providing features not found in other cloud software or virtualization-based data center management software.
Conference Paper
Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed computing dynamic environments for end-users. This paper reviews recent advances of Cloud computing, identifies the concepts and characters of scientific Clouds, and finally presents an example of scientific Cloud for data centers
Conference Paper
Obtaining cloud computing services can be viewed as a form of outsourcing, and as such it shares the essential risk profile of all outsourcing contracts concerning opportunistic behavior, shirking, poaching, and opportunistic renegotiation. Developing cloud computing is also an advanced technological development effort, and as such it shares all of the risks of large and uncertain development efforts and the essential risk profile of all development efforts where for a variety of reasons success cannot be ensured, including functionality, political, project, technical, and financial risks. Since E-Government services are almost by definition delivered online, rather than by visiting government service locations or through paper-based interaction, they would appear an obvious candidate for cloud-based delivery; consequently the risks of cloud-based delivery services are of critical interest to the safe execution of numerous E-Government missions. This paper focuses on understanding the risks, both through understanding standards and understanding contracting for cloud services. Standards for cloud computing may reduce many of the risks of opportunistic behavior on the part of vendors. Standards efforts cannot mitigate most of the development risks of cloud computing; no amount of legislation or standardization can make it possible for firms to do that which they could not have done, or that which is indeed algorithmically or computationally infeasible.
Conference Paper
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these mechanisms are no longer adequate, but need to be rethought to fit this new paradigm. In this paper we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.
Conference Paper
Cloud computing has been acknowledged as one of the prevaling models for providing IT capacities. The off-premises computing paradigm that comes with cloud computing has incurred great concerns on the security of data, especially the integrity and confidentiality of data, as cloud service providers may have complete control on the computing infrastructure that underpins the services. This makes it difficult to share data via cloud providers where data should be confidential to the providers and only authorized users should be allowed to access the data. This work aims to construct a system for trusted data sharing through untrusted cloud providers, to address the above mentioned issue. The constructed system can imperatively impose the access control policies of data owners, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data.
Conference Paper
Cloud computing is a way of computing, via the Internet, that broadly shares computer resources instead of using software or storage on a local PC. Cloud computing is an outgrowth of the ease-of-access to remote computing sites provided by the Internet. Instead of installing a suite of software for each computer, we'd only have to load one application. That application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs. It's called cloud computing, and it could change the entire computer industry. In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest.
Conference Paper
This paper presents a latest vision of cloud computing and identifies various commercially available cloud services promising to deliver the infrastructure on demand; defines Cloud computing and provides the architectural detail and different types of clouds such as Blue Cloud built on IBM's massive scale computing initiatives, Google Cloud claimed that business can get started using Google Apps online pretty much instantly, salesforce.com cloud architecture consists of development as services, a set of development tools and APIs that enables enterprise developers to easily harness the promise of the cloud computing. Cloud computing is changing the way we provision hardware and software for on-demand capacity fulfillment and changing the way we develop web applications and make business decisions.
Conference Paper
Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight the Cloud interoperability issue that deserves substantial further research and development.
Article
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology’s (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.
Article
With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general community. To deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing. Hence, in this paper, we define Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA)-oriented resource allocation. In addition, we reveal our early thoughts on interconnecting Clouds for dynamically creating global Cloud exchanges and markets. Then, we present some representative Cloud platforms, especially those developed in industries, along with our current work towards realizing market-oriented resource allocation of Clouds as realized in Aneka enterprise Cloud technology. Furthermore, we highlight the difference between High Performance Computing (HPC) workload and Internet-based services workload. We also describe a meta-negotiation infrastructure to establish global Cloud exchanges and markets, and illustrate a case study of harnessing ‘Storage Clouds’ for high performance content delivery. Finally, we conclude with the need for convergence of competing IT paradigms to deliver our 21st century vision.
Conference Paper
This paper reviews trust from both a social and technological perspective and proposes a distinction between persistent and dynamic trust. Furthermore, this analysis is applied within the context of trusted computing technology.
Conference Paper
Utility computing offers researchers and businesses the potential of significant cost-savings, making it possible for them to match the cost of their computing and storage to their demand for such resources. A utility compute provider enables the purchase of compute infrastructures on-demand; when a user requires computing resources a provider will provision a resource for them and charge them only for their period of use of that resource. There has been a significant growth in the number of cloud computing resource providers and each has a different resource usage model, application process and application programming interface (API)-developing generic multi-resource provider applications is thus difficult and time consuming. We have developed an abstraction layer that provides a single resource usage model, user authentication model and API for compute providers that enables cloud-provider neutral applications to be developed. In this paper we outline the issues in using external resource providers, give examples of using a number of the most popular cloud providers and provide examples of developing provider neutral applications. In addition, we discuss the development of the API to create a generic provisioning model based on a common architecture for cloud computing providers.
Article
This paper discusses the concept of Cloud Computing to achieve a complete definition of what a Cloud is, using the main characteristics typically associated with this paradigm in the literature. More than 20 definitions have been studied allowing for the extraction of a consensus definition as well as a minimum definition containing the essential characteristics. This paper pays much attention to the Grid paradigm, as it is often confused with Cloud technologies. We also describe the relationships and distinctions between the Grid and Cloud approaches.
Cloud Computing a Practical Approach
  • A Velte
  • T Velte
  • R Elsenpeter
A. Velte, T. Velte, and R. Elsenpeter, R. "Cloud Computing a Practical Approach', McGraw-Hill, USA, 2010.
Efficient framework for ensuring the effectiveness of information security in cloud computing
  • D Karunanithi
  • B Kiruthika
D. Karunanithi and B. Kiruthika, "Efficient framework for ensuring the effectiveness of information security in cloud computing, International Conference on Signal, Image Processing and Applications, workshop of ICEEA, 2011.
Washington itching to take the lead on cloud computing
  • M O'gara
M. O'Gara, "Washington itching to take the lead on cloud computing", 2009, SOA, accessed on December. 2013, available at: http://govit.sys-con.com/node/1055764.
Cloud computing use cases
  • P A Dustin Amrhein
  • A De Andrade
  • E A B Armstrong
  • J Bartlett
  • R Bruklis
  • K Cameron
P. A. Dustin Amrhein, A. De Andrade, E. A. B. Armstrong, J. Bartlett, R. Bruklis, and K. Cameron, "Cloud computing use cases", White Paper. Version 3.0 ed., 2010, pp. 1-7.
Intermediaries in Cloud-Computing: A New Computing Paradigm
  • R K Chellappa
R. K. Chellappa, "Intermediaries in Cloud-Computing: A New Computing Paradigm", INFORMS Annual Meeting, Dallas, TX, October 26-29, 1997, accessed on December. 2013, available at: http://www.bus.emory.edu/ram/.