Open Access Open Access  Restricted Access Subscription or Fee Access

An Overview of Cloud Computing

N. Sowndarya, V. Umarani

Abstract


Cloud computing is the delivery of computing service done through the internet. Cloud computing services are carried by a third party provider who owns the organization. Cloud computing is a new computational pattern that offers an innovative business model for organizations to agree IT services without blunt investment. Cloud computing moves the application software and database to the large data center where the data management and service may not fully trustworthy. Cloud computing does not need the original data for its check, and only two small messages need to be exchanged for each check. Both of these properties should be attractive to designer of remote storage schemes. As Peer-to- Peer technology has matured, a number of systems such as Oceanstore, Intermemory, Ivy, PAST, Starfish, FarSite have been built to utilize remote data storage. In this paper, we discuss about data storage and security issues of Cloud computing.


 


Keywords


Cloud Computing, Services, Data Storage, Access Control.

Full Text:

PDF

References


P. Mell, T. Grance, The NIST Definition of Cloud Computing, NIST Special Publication 800-145, 2011. .

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G.Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, A view of cloud computing, Commun. ACM 53 (4) (2010) 50–58.

Gurdev Singh, Shanu Sood, Amit Sharma, CM- measurement facets for cloud performance, International Journal of Computer Applications 23 (3) (2011).

A. Ben Letaifa, A. Haji, M. Jebalia, S. Tabbane, State of the art and research challenges of new services architecture technologies: virtualization, SOA and cloud computing, International Journal of Grid and Distributed Computing 3 (4) (2010).

C. Gong, J. Liu, Q. Zhang, H. Chen, Z. Gong, The characteristics of cloud computing, in: 39th International Conference on Parallel Processing Workshops (ICPPW), 2010, pp. 275–279.

S. Zhang, S. Zhang, X. Chen, X. Huo, Cloud computing research and development trend, ICFN ’10 Second International Conference on Future Networks, 93–97 (2010) 22–24.

Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. International Journal of Information Security 4(4), 277–287 (2005)

Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Advances in Computers 54, 216–272 (2001)

S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010.

M. A. Morsy, J. Grundy and Müller I. “An Analysis of the Cloud Computing Security.

Ateniese, G., Di Pietro, R., Mancini, L., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm’08, pp. 9:1–9:10. ACM, New York, NY, USA (2008).

National Institute of Standards and Technology, NIST Definition of Cloud Computing, Sept 2011.

S. Arnold (2009, Jul.). “Cloud computing and the issue of privacy.” KM World, pp14-22. Available: www.kmworld.com [Aug. 19, 2009].

A Platform Computing Whitepaper. “Enterprise Cloud Computing: Transforming IT.” Platform Computing, pp6, 2010.

Global Netoptex Incorporated. “Demystifying the cloud. Important opportunities, crucial choices.” pp4-14. Available: http://www.gni.com [Dec. 13, 2009].

P.Kresimir and H. Zeljko "Cloud computing security issues and challenges." In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp. 344-349.

Xiao Zhang; Hong-tao Du; Jian-quan Chen; Yi Lin; Lei- jie Zeng, "Ensure Data Security in Cloud Storage," Network Computing and Information Security (NCIS), 2011 International Conference on , vol.1, no., pp.284-287, 14-15 May 2011.

Xiaojun Yu; Qiaoyan Wen, "A View about Cloud Data Security from Data Life Cycle," Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on , vol., no., pp.1-4, 10-12 Dec. 2010.

He Yuan Huang; Bin Wang; Xiao Xi Liu; Jing Min Xu, "Identity Federation Broker for Service Cloud," Service Sciences (ICSS), 2010 International Conference on , vol., no., pp.115-120, 13-14 May 2010.

Shigang Chen, Meongchul Song, Sartaj Sahni, Two Techniques for Fast Computation of Constrained Shortest Paths, IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 105-115, February 2008.

King-Shan Lui, Klara Nahrstedt, Shigang Chen, Hierarchical QoS Routing in Delay-Bandwidth Sensitive Networks, in Proc. of IEEE Conference on Local Area Networks (LCN’2000), pp. 579-588, Tampa, FL, November 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.