Chapter 1 : Introduction
Cloud computing : Cloud computing is a new class of network based computing that takes place over the internet. Large number of remote servers are allow to centralized data storage and there is online access to computer resources and services.
Characteristic that define cloud data ,applications services and infrastructure are given below:
• Remotely hosted : Remotely hosted means data and services in cloud computing are hosted on remote infrastructure.
• Ubiquitous : It means services and data in cloud can be access from anywhere.
• Commodified : It means that in cloud you can pay for what you would want.
Cloud computing Environment
Essential Characteristics that a cloud must possess:
On-demand self-service: A customer
…show more content…
Myth7 Big data is not a big deal : This is wrong that big data is not a big deal.With ever increasing amounts of business, digital data are generating and storing more information.If not taken into account this could lead to damaged and ineffective storage and systems. By moving into the cloud consumer will achieve far greater storage efficiency and a structured approach to data management that will help you achieve and sustain competitive advantage.
Types of cloud computing
Public cloud: The public cloud means the computing services are available on the public Internet. Generally, public cloud providers like Microsoft,Google and Amazon AWS own and operate the infrastructure and offer access over the Internet.Some benefits of public cloud are discussed below:
• The public cloud reduce costs.
• The public cloud is highly scalable.
• Public cloud provides universal scalability.
• Applications and data are automatically upgraded and backed
…show more content…
Encryption mechanisms are depends on the reliability of the difficulty of decryption mechanism. Encryption methods include asymmetric key encryption systems and symmetric key encryption system. Asymmetric key can get high security because it use different keys but encryption and decryption is slow.
2.Security threats in cloud computing, Authors(Farhan bashir shaikh, Sajjad haider),2011
Discription: Services of cloud are used by both larger and smaller scale organizations.Cloud computing has huge advantages but it is a global phenomenon therefore it has some disadvantages. Both the Service providers and the consumers must work together to ensure safety and security of data on clouds. Customers of cloud services are in fear of data loss and privacy.This paper propose to use The Cloud Security Alliance (CSA) release of a new governance, risk management, and compliance stack for cloud computing. The cloud security tools are available for free download, is meant to help organizations create public and private clouds that act accordingly with industry standards for accepted governance, risk, and compliance (GRC) best practices. The GRC stack has three components: a controls framework, a technical foundation and a questionnaire for assessing what the CSA (cloud security alliance) calls for platform-, infrastructure- and software-as-a-service
Public cloud : Open cloud alludes to a registering administration demonstrate utilized for the provisioning of capacity and computational administrations to the overall population over the
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
The first cloud infrastructure that I would like to describe is the Platform as a Service model, also known as PaaS. The platform in PaaS describes the fact that it provides the computers operating system and hardware for the use of applications. To expand on the platform description it easier to say that a company can use this cloud infrastructure in order to run their software rather than having to buy each computer and software to run a program for each computer. A plus side of using PaaS is that new developers are able to test applications in the cloud without crashing their own computer. It is also capable of storing information on the cloud which frees up hardware storage space. The traditional type of networking where you every computer had to be networked and hardwired to each of the
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
According to Lisa Arthur, big data is as powerful as a tsunami, but it’s a deluge that can be controlled. In a positive way it provides business insights and value. Big data is data that exceeds the processing capacity of conventional database systems. It is a collection of data from traditional and digital sources inside and outside a company that represents a source of ongoing discovery and analysis. The data is too big, moves to fast, or doesn’t fit the structures of the database architecture. Daily, we create 2.5 quintillion bytes of data. In the last couple years we have created 90% of data we have in the world. This data comes from many places like climate information, social media sites, pictures or videos, purchase transaction records, cell phone GPS signals, and many more places. From the beginning of recorded time through 2003 users created 5 billion gigabytes of data. 2011, the same amount was created every couple days. 2013, we created that same amount every ten minutes. Some users prefer to constrain big data into digital inputs like web behavior and social network interactions. The data doesn’t exclude traditional data that is from product transaction information, financial records and interaction channels.
7. “What cloud computing really means.” By Eric Knorr, Galen Gruman. Accessed. 21 November 2013. < http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 >
In short, the Big Data challenges for organizations and enterprises in today's digital age. Once mastered big data, they will have greater chances of success in today's competitive environment, the world would benefit more from the extracted information more accurately, more useful lower costs. Still the criticism revolves around Big Data, however, the field is still very new and we'll see in future Big Data will evolve like.
The key strategy implementation efforts at Amazon all surround the use of “big data”. Big data is the growth and availability of large volumes of structured/unstructured data. The use of big data has allowed decision making based upon data and analysis instead of past experience and intuition. Big data has directed organizational change in allowing Amazon to expand from an online book store to an internet giant. Revolutionary application of big data has allowed Amazon to create superior service quality while motivating employees by providing real time information to solve customer issues. Big data has strengthened Amazon’s competitive capabilities by pioneering the application of big data and charging a monthly fee to smaller businesses
You may ask what big data analytics is. Well according to SAS, the leading company in business analytics software and services describes big data analytics as “the process of examining big data to uncover hidden patterns, unknown correlations and other useful information that can be used to make better decisions.” As the goal of many companies which is to seek insights into the massive amount of structured, unstructured, and binary data at their disposal to improve business decisions and outcomes, it is evident why big data analytics is a big deal. “Big data differs from traditional data gathering due to that it captures, manages, and processes the data with low-latency. It also one or more of the listed characteristics: high volume, high velocity, or high variety. Big data comes from sensors, devices, video/audio, networks, log files, web, and social media which much of it is generated in real time and in a very large scale.”(IBM) In other words, companies moving towards big data analytics are able to see faster results but it continues to reach exceptional levels moving faster than the average person can maintain.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
For example services such as, Google Docs, Flickr, YouTube or Yahoo Mail, actually already using cloud computing. These allow you to store t...
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
Two simple techniques for encrypting information are: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption). Symmetric algorithms are faster, but the main problem associated with this algorithm is key distribution. On the other hand, asymmetric encryption eliminates key security problem, but these algorithms take too much time for encryption and decryption. Certain systems use asymmetric encryption for secure key exchange joined with symmetric algorithms for rapid data encryption. One of highly regarded symmetric algorithms is AES (Advanced Encryption Standard), AES is encryption standard recognized by the U.S. National Institute of Standards and Technology (NIST)
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.