CLOUD COMPUTING

CLOUD COMPUTING

Sanjeeva kumar geejula

Computer science department Griffith College (Dublin)

Introduction:

Cloud computing are clusters of distributed computers. Provide on-demand resource and services over the web. Clouds that provide on-demand computing instances can use these instances to supply software as a service.  For some cloud computing applications, security is still somewhat immature.

Literature review:

This slideshow requires JavaScript.

Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs.

Buying computers for everyone isn’t enough — you also have to purchase software or software license to give employees the tools they require. Whenever you have a new hire, you have to buy more software or make sure your current software license allows another user. It’s so stressful that you find it difficult to go to sleep on your huge pile of money every night.

example : Microsoft office.

Cloud computing is often offered with a pricing model that lets you pay for only used service. What i mean is pay as you go. Usually cloud computing is used by large organizations, some companies that depend on cloud computing have infrastructure that scale over several data centers.  Companies that require additional services simply request them from the cloud. Cloud computing provide several important benefits over today cloud’s usage in which an company purchases servers at a time and operates them for themselves. First, cloud service enjoys the same economies of scale that data centers provide. Security is an area of cloud computing that presents some special services.  First Cloud computing services are often remote they can suffer the latency and bandwidth related issues linked with any remote application. Because hosted cloud services serve multiple customers, various issues related to multiple customers share the same piece of hardware can arise the problem. Also, having data accessible to third parties can present security, compliance, and regulatory issues. [1][2]

Some trusted companies came across with set of hardware and software technologies to enable the construction of trusted platforms. Chips that are now bundled with commodity hardware will play a secure role to prevent threat. [2]

Conclusion:

In this report, we argue that what is a cloud computing — cloud is actually an application (software’s, websites, like… face book…meebo chat room…and many more) which we run on our system without installing it. And even we came across with security features. In future we see more security future for cloud computing.

References:

[1] Robert L.Grossman  2009IEE computer society University of Illinois at Chicago and open data group.

[2] Nuno Santos  Krishna P. Gummadi  Rodrigo Rodrigues   MPI-SES.

[3] B.D Payne, M. Carbone, and w.lee. Secure and Flexible Mon-itoring of Virtual Machine, 2007.

[4] T.R.Peltier,J.peltier. and J.Blackley. Information Security Fundamental, publication, Boston, MA, 2003.

[5] D.G Murray improving Xen security through disaggregation in Proc.of VEE 08.

[6] http://www.google.ie/images?hl=en&q=image+of+cloud+computing&um=1&ie=UTF-8&source=univ&ei=8YLmTPvWFNC7hAeXg63XDA&sa=X&oi=image_result_group&ct=title&resnum=1&ved=0CDAQsAQwAA&biw=1280&bih=615

Leave a comment