CHAPTER 1
INTRODUCTION
1.1. Cloud computing:
Cloud computing is a model for delivering data resources to cloud end users, in which data resources are stored in distributed manner, data resources can be accessed on the internet using web-based tools and applications. Data and software packages are stored in server database. However, cloud server allows the cloud users to access data resources as long as system is connected to the internet.
In cloud computing, the cloud service providers (CSPs), such as Amazon, are able to deliver various services to end users, with the help of powerful datacenters. By combining the local data management systems into cloud servers, users can enjoy high-quality services and save significant investments on
…show more content…
Infrastructure as a Service (IaaS): Allows the cloud users to deploy and run their arbitrary software, it also provides the facilities of processing, data storing and network. The cloud servers manage and control operations of the underlying cloud infrastructure but cloud end users has control over data storage, operating systems and application. 1.1.4 Advantages of cloud computing:
1. Globalize the workforce on cheap: Cloud users can access the cloud services from the remote place just connected to the internet.
2. Reduce spending on technology infrastructure: Easy access of information with minimum upfront spending. Based on the pay per use or pay as you go basis.
3. Globalize your workforce on the cheap: cloud users can access the cloud resources around the worldwide independent of the location, connected to the internet.
4. Streamline processes: More work can be done in less amount of time, using less number of peoples.
5. Reduce capital costs: There is no requirement of spending huge money on hardware devices or software when accessing cloud resources.
6. Improve accessibility: A cloud user can access cloud service anytime, anywhere like
…show more content…
But, in single-attorney manner complexity of member participation and revocation in these systems is linearly dependent on the file data owners and revoked users, respectively. A secure provenance scheme based on the cipher text-policy attribute-based encryption by adopting group with the single attribute, which allows group member to share data with others in the group. But user revocation in this method is not specified. In this technique, a group member is able to securely share data files with others in the dynamic groups in multi-attorney manner without showing real identity to the cloud. Additionally it supports efficient user revocation and new member entry into the group and user revocation is done through public revocation list without updating keys of the remaining users and new granted users can decrypt data files directly without contacting data file owner, who uploaded the data file before participation of new granted
The idea of accessing, storing, and processing data from online server or virtual server instead of local server is called as Cloud computing. When we store data in our hard disk which is very near to computer that is called as local storage and computing but Cloud computing doesn’t access data from our hard disk.
guaranteeing that IT conveys the guaranteed benefits irrespective of methodology, focusing on streamlining costs and demonstrating its characteristic
Virtualization is a technology that creates an abstract version of a complete operating environment including a processor, memory, storage, network links, and a display entirely in software. Because the resulting runtime environment is completely software based, the software produces what’s called a virtual computer or a virtual machine (M.O., 2012). To simplify, virtualization is the process of running multiple virtual machines on a single physical machine. The virtual machines share the resources of one physical computer, and each virtual machine is its own environment.
The second cloud infrastructure that I would like to describe is the Software as a Service model, which is also known as SaaS. The SaaS model provides a broad scope of devices that are able to access software programs from one company’s applications. System as a service was developed to run applications from any device or user that has permission from the host. The book states, “Online email services, such as Gmail and Yahoo!, are good examples of SaaS” (Jill West, 2016). Cengage Learning made the Software as a
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
...Implementation of cloud systems can be implemented in stages with costs that coincide with usage. The ROI outweighs the issues or problems that could occur. Cloud computing gives a competitive advantage of being able to keep up with changes in technology without having the cost involved. Amazons cloud computing allowed companies like Ericsson to remain competitive and thrive.
Increased productivity amongst staff. Improved morale amongst employees and staff. The ability to work more effectively as a team, rather than individuals. Reduce the time to make and discuss key issues as each individual trusts in the judgement and expertise of their colleagues. (Towers,
Instead of purchasing infrastructure equipment, companies can buy resources as a fully outsourced service on demand by using IaaS cloud computing. According to Kepes, some sub-categories are worth noting for IaaS as it is as public that consists of shared resources, deployed on a self-service basis over the Internet (Kepes, 2013). For example, Amazon is one of the largest IaaS providers. The line between PaaS and IaaS is becoming more blurred as vendors introduce tools as part of IaaS helps deploying multiple types of clouds. Kepes stated that moving to cloud infrastructure has given him more peace of mind where his company had a part-time systems administrator working on their sites. The systems administrators will make minor changes as they see fit and respond to any downtime within minutes to fix the problem.
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
The term used as cloud computing is a wide term. It includes a wide range of different services. Cloud computing is also known as on demand computing. This name is given to cloud computing because it provide online services to different persons on computer by sharing processing resources in addition with data to computers depending upon different demands.
Cloud storage basic terms, is a way to save information to the web that can managed data storage. Cloud computing services are online services, which store this information to a safe and secure location online. It’s offered a quicker, easier and safer backup than conventional methods of file storage such as bookshelves or cardboard files.
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
The technology boom has changed how people view their lives and daily routines. Tasks that could have taken hours to accomplish can be done in just minutes by the push of a button. Many would say that having the ability to get something done in a fast and easy
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.