I. INTRODUCTION Cloud computing has been ideas as the next generation paradigm in computation. Cloud is an environment of the software and hardware resources in the centers of data that provide diverse services over the network or the Internet to satisfy user’s requirements [1]. The explanation of “cloud computing” from the National Institute of Standards and Technology (NIST) [2] is that cloud computing enables omnipresent, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. According to the explanation, cloud computing …show more content…
Data security has systematically been a major issue in IT. Data security becomes particularly serious in the cloud computing environment, because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as wireless sensor networks and smart phones. Data security in the cloud computing is more complicated than data security in the traditional data systems. To make the cloud computing be adoptive by users , first to make cloud environment trustworthy to win confidence of users to adopt this technology. Before the data security issues are discussed, the functions of cloud computing are examined first for facilitates and manages the services. Cloud computing environment allow two basic types of functions: computing and data storage. The cloud is growing incessantly because it could provide high performance computational services at cheaper rates. Famous IT companies such as Microsoft, Amazon, Google and Rake space have provided cloud service on the Internet. Organizations and companies are moving and extending their business by adopting the cloud computing to reduce their cost. According to the difference of entree scope, cloud can be divided into three types: public cloud, private cloud, and hybrid cloud. A private cloud is a cloud in which only authorized users can access the Services and privacy from the provider.
Cloud computing is on the rise. Cloud computing is a style of computing where software and virtualized hardware is provided over the internet (O’Brien & Marakas, 2011). The seven most common uses of cloud computing include: infrastructure as a service, private cloud or hybrid cloud, test and deployment, big data analytics, file storage, disaster recovery and backup (Ferkoun, 2014). The biggest advantages of cloud computing include increasing competitiveness through cost reduction, greater flexibility, and elasticity and optimal resource utilization (Ferkoun, 2014). Cloud computing basically uses the internet to provide for the computing needs of the end users.
This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks
Cloud computing is innovative which uses well advanced computational power resource and gigantic improvement in storage capabilities, Cloud is the long dreamed vision of computing utilities, which helps in enable ling the sharing of
Cloud computing is revolutionizing many ecosystems by providing organizations with computing resources featuring easy deployment, connectivity, configuration, automation and scalability. This paradigm shift raises a broad range of security and privacy issues that must be taken into consideration. Loss of control, and trust are key challenges in cloud computing environments. This paper will be describing and focusing on cloud security and privacy. In addition to cloud security, the general model of cloud computing is also described where the cloud security and privacy issues can be approached. To preserve such issues, some propositions for cloud security for reference are also proposed along with a brief description for deployment in cloud computing.
Cloud computing provides a flexible, collaboration and cost efficient way for business to manage computing resource online. However, while cloud services provide potential benefits to business, it also come with increased security risks.
Cloud Computing provide enterprises and users with varieties of capabilities for store and process data in the data centers of third-party. It depends on resources sharing to carry out accordance and economies of scale, like a utility over a network. The basic of Cloud Computing is the extended concept of sharing services and aggregate infrastructure. It is the product of evolution and using current exponents and technologies.
According to the definition of the U.S. National Institute of Standards and Technology (NIST, 2011), “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. This cloud model is collected of five essential characteristics, three service models, and four deployment models. Moreover,
Cloud computing, even though some of the concepts were around for since as far back as the 1950’s, is considered the latest digital revolution. Cloud computing is a very controversial subject and term because of its old roots however, cloud computing is the evolution of these technologies and paradigms. Cloud is an alignment of procedures, hardware, and software to create a redundant, flexible, and cost-efficient solutions for developers, consumers, and businesses. The cloud allows us to access store and access data from anywhere in the world. The Cloud can scale to theoretically unlimited computing resources such as Central Processing Unit (CPU) power, Persistent Hard Disk Drive (HDD) storage, and Random Access Memory (RAM) to run more robust applications. The unparalleled possibility in scalability of the cloud rids us of the limitations and the growing pains traditionally had when scaling physical devices and at fraction of the cost. This paradigm also allows for companies to focus on what they do best verses needing to investing in, spending time on building the technology to complete their company’s vision.
Security of data has reliably been a noteworthy issue in information technology. In the cloud computing environment, it turns out to be especially genuine on the grounds that the data is situated in better places even in all the globe. Information security and protection assurance are the two primary elements of client 's worries about the cloud technology. In spite of the fact that numerous strategies on the subjects in cloud computing have been examined in both scholastics and commercial enterprises, data security and protection assurance are turning out to be more imperative for the future advancement of cloud computing technology in government, industry, and business. Data security and privacy protection issues are applicable to both hardware and software in the
Cloud computing emerge as a computational prototype as well as a sharing architecture and its main intention is to provide secure, quick, convenient data storage and net computing services and dispatched all
Despite its growing importance and necessities, cloud computing has several drawbacks and disadvantages. People need to think twice when it comes to cloud computing. They need to ask themselves questions like whether it is convenient or not, whether it is right or not, whether it is safe or not. No doubt that everyone is getting into it, but still there are several factors that have to be considered like:
ABSTRACT: Cloud computing is nothing but an internet based connection to remote servers which allows to store data and access to all services. These services are provided by the third party who owns the infrastructure. Cloud computing is classified into public, private or hybrid. It is a kind of grid computing. It is flexible and easy to adapt. Apart from advantages organizations are very slow in processing the customer resources because it has some security issues and challenges associated with it. Security is the main issue which is becoming a big hurdle for the growth of cloud computing. The companies are worrying to handle some important data to other companies due to these security challenges. This paper is going to give brief
Cloud computing relies on sharing computing resources in a virtualized world rather than owning that locally to handle applications. Cloud adoption across the enterprise is a growing reality. Cloud infrastructure is also becoming popular in the scientific research and academic community because of its ability to provide a large number of computing resources for performing large-scale experiments. The advent of the Internet of Things (IOT) and smart mobile computing devices along with secure access to Big Data and immensely improved big-data analytics capabilities have pushed the computing paradigm into new frontiers. Cloud computing offers a completely new infrastructure for utilizing compute and storage
Cloud is a trending term across the Internet and is often confused with data center and virtualization. To begin with, data center and virtualization are centric to the cloud, but scope of the cloud as a whole is much wider. To put in simple words, a cloud is a pool of large configurable resources that are available on demand over the Internet. These resources can be available in the form of storage devices, servers, processors, and network interfaces [4]. Packaging these resources to provide services to end-users is termed as cloud computing. The users are provided with an ease of accessibility
Security Issues : There are many challenges in the area of cloud computing and security is one of them. Increasing the level of security is required for improving the quality of cloud based services. Location of data is a important factor in the security of cloud based computing. Transparency of the data location provides the flexibility for cloud based computing, but this is also a threat related to security. For cloud users, to maintain their personal data is a major issue related to cloud computing security. Technical security and policies for cloud users plays a vital role in the cloud security. To build trust and establish it for customers who want to use cloud services, is another issue related to the cloud based computing. Security attacks is another issue related