Cloud Storage: Security
Imagine you are going to a technology conference in japan that your company spent thousands of dollars to get you to and you have been given the privilege of speaking at. You fly all the way there and of course your luggage with all of your files including your whole presentation and speech, computer, and not to mention your clothes is left back at Orlando International airport. Just a few years ago this would have been detrimental. You would have had no way to get to your documents that are trapped in your suitcase behind the scenes of the baggage claim in Orlando. On the other hand, today you can just buy a new cheap business outfit, and log into your cloud where all of your important documents would be sitting
…show more content…
The hypothetical person to first talk of an “intergalactic computer network” (Mohamed) was in the nineteen sixties by J.C.R. Licklider who made ARPANET- Advanced Research Projects Agency Network (1969). Licklider wanted everyone on Earth (from anywhere on earth) to be able to have access to their data. Other people believe that John McCarthy, a computer scientist, had the idea of cloud computing first. Even though the official person to think of accessing your data from anywhere at any time from any device is up for grabs the actual development of the cloud for everyday use did not really take off until the nineties when internet got enough bandwidth to handle it. In 1999 Salesforce.com was the first website to deliver applications through a website. Amazon Web Services was made in 2002 and it “provided a suite of cloud-based services including storage, computation and even human intelligence through the Amazon Mechanical Turk.”(Mohamed) The Amazon Mechanical Turk website is still running and helping people complete HIT’s (human intelligence tasks) through their accounts. Amazon also introduced EC2 which is the Elastic Compute Cloud. It is a service for small companies and individual so they can rent computers to run their own applications on. “Amazon EC2/S3 was the first widely accessible cloud computing
Cloud computing is the practice of using remote storage for applications and data. The idea itself is not a new one; it has been in use for many years albeit under different names. In the earliest days of the computer age machines had to be physically large to contain the hardware required to do their jobs. It was impractical and prohibitively expensive to provide one of these mainframes for individual users; not to mention for what they were used for, unnecessary. Instead, one central computer was wired to several terminals that users could interface with. Typically, only large organizations such as, major corporations or government agencies could afford one of these machines or had need of one. This was the birth of cloud computing. Until the early 1980s this system was typical for any organization requiring large amounts of processing power. It was considered unnecessary and difficult to put the nuts and bolts of applications onto users’ desktop machines. Rather, by keeping applications in a central location, they could be managed and updated more easily and large amounts of storage space and processing power were not needed on desktop machines. Indeed, before this time there were no desktop machines mass produced that could achieve this level of power. This was about to change.
Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
Within the past 10 years our societies technological advantages have been somewhat space age like, even alien like characteristics. Technologies, which ten years ago only existed in our dreams but yet, have become reality. Things like, the revolutionary iPhone and its almost seamless touch-screen tech; as well as the new advancements in our cultures most prized possession, The Internet. In this subject-based paper, I will take a closer look into a fairly new emerging technology, which is simply referred to as…Cloud Technology. The synopsis will cover, what and how cloud technology works, its
Shortly after that, In J.C.R Licklider began conceptualize the idea developing a globally accessible network of computers that would allow access of applications and data remotely throughout the world, wherever the internet existed. Of course all of this would require huge bandwidth capabilities that at that time were not available. However, this all became possible in the 1990’s when the bandwidth of the internet had evolved to be large enough to bring cloud computing to the world ("history of cloud computing," 2009).
One of the first major milestones for cloud computing was the appearance of Salesforce.com in 1999. They lead the way for the idea of providing enterprise applications through website. Salesforce.com created the way for other software companies to distribute other applications all over the internet. The next big advancement was Amazon Web Services in 2002, which supplied a group of cloud-based services which included storage, computation and even human intelligence through the Amazon Mechanical Turk. In 2006, Amazon then launched its Elastic Compute cloud (EC2), as a commercial web service that allowed small companies and individuals to rent computers to run their own computer applications. An additional milestone achievement came in 2009 when Web 2.0 hit its big mark and Google and other software companies started to provide browser-based enterprise applications, though services such as Google Apps (Hicks, 2011). "The most important contribution to cloud computing has been the emergence of "killer apps" from leading technology giants such as Microsoft and Google. When these companies deliver services in a way that is reliable and easy to consume, the knock-on effect to the industry as a whole is a wider general acceptance of online services.” -Dan Germain, chief technology officer at IT service (Vance, 2011).
By 2020, Forbes (McKendrick, 2012) has estimated that the cloud market will be worth $270 billion; this suggests that the market is expanding rapidly and users are becoming more aware of this feature. Many people, though, still ponder over the exact purpose of cloud computing: Cloud computing is a group of offline servers that are networked together to allow data to be stored centrally. For example, Drop box is an established cloud storage company that allows users to store documents, images and videos on their servers. This type of cloud computing is known as ‘Software-as-a-Service’, which are business applications that are hosted by the provider and delivered as a service (Hurwitz, 2010). Hurwitz also mentions two other types of cloud computing: ‘Platform as a Service (PaaS)’ and ‘Infrastructure as a Service (IaaS)’. ‘Platform as a service’ is where the consumer will create an application, using tools and software from the provider, then the provider will administer the consumer with networks, storage and servers. ‘Infrastructure’ as a service is where the provider will provide the consumer with physical computer or virtual machine.
The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles Cloud computing is so named because the information being accessed is found in the "clouds", and does not require a user to be in a specific place to gain access to it. The services are offered from data centres all over the world, which collectively are referred to as the "cloud." The idea of the "cloud" is to simplify the huge network connections and computer systems involved in online services. Cloud computing is a computing model, not a technology. In this model of computing, all the servers, networks, applications and other elements related to data centres are made available to IT and end users. Cloud computing is a type of computing that is comparable to grid computing. It relies on sharing computing resources rather than having local servers or personal devices to handle applications.
Dropbox is one such service that carries out file storing and sharing on large scale. It can be used to store the files, back up the files,
Cloud Computing is huge computing utility, where user can remotely store their data into the cloud and enjoy on-demand high quality cloud application and services without the burden of local hardware and software management and also decreases the maintenance load of users by providing low cost, scalability. In the corporate world, there are a large number of clients who accessing their data and modifying data. The user can access data, use the data and store that data. Cloud computing moves the application software and databases to the centralized large data centers, where the management of data and services may not be fully dependable. To manage this data, we use TPA (third party auditor) it will check the reliability of data but it increases the data integrity risk. We propose a secure cloud storage system for privacy preserving public auditing.
Cloud Computing appears as a computational paradigm as well as distribution architecture and its main objective is to Provide secure, quick, convenient data storage and net computing device, with all computing resource visu-alized as service ,with all computing resources visualized as service and delivery over the internet [1,2].The cloud enhances collaboration, agility, scalability, availability, ability to adapt to fluctuations according to demand, accelerate development work, and provides potential for cost reduction through optimized and efficient compu-ting [3,5].Cloud computing is buzz word of IT industry today and present everywhere and every one's mind. Cloud computing is ubiquitous, next generation's infor-mation technology architecture which offers on-demand access to the network. It is dynamic, virtualized, scalable and pay per use model over internet. Cloud computing is a box of several concepts such as virtualization, Service oriented architecture (SOA), web 2.0 and many more. In some respects, Cloud Computing represents the maturing of these technologies and is a marketing term to repre-sent that maturity and the services they provide [4].There are several advantages of adopting cloud computing but still journey of cloud is not easy. Cloud still is its early stage, suffering from many pitfalls and one of the most concern is security along with availability, privacy and compliance. Traditional security mechanism such as Authentication , authorization ,
Usability of cloud service has made it easier for an organization to use this service. For instance, its ability to drag and drop from local storage to the cloud is seamless and it integrates with either a PC or Mac. Therefore, it frees up bandwidth on the local storage, which ultimately means that local servers will run quicker and far more efficient. In addition, the cloud service also provides a link to data recovery, incase local storage experiences a disaster of some sort. All of which, ultimately, reduces cost for an organization.
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.
So what is the Cloud? Most people understand that it has something to do with the internet and this is very true. Much of what we do on the internet falls under some part of the concept of Cloud computing. Basically any time you store data somewhere online or access data or applications from the internet that aren’t running directly on your own computer, you are engaging in Cloud computing. Storing data in services like Microsoft Onedrive or Google Drive would be what comes to most people’s minds if you were to ask them if they use the Cloud. But it goes much farther than that. Social media
In this work I am proposing to design framework based on trusted computing technology to improve data security and confidentiality in the cloud. In order to do that I will work on defining protocols to make sure that data storage and replication is only done on trusted storage servers and also data access from the cloud is secure for the client and users. Cloud computing allows clients to use computing resources with option of pay per use. It is convenient option used widely in Information Technology industry. Data security and confidentiality is problematic when data transfers to third party.