Cloud Computing and Storage Issues
Abstract
This paper talks over security issues for cloud computing & presents a layered framework for secure clouds and then focus on layers, i.e., the storage layer & the data layer. Cloud computing is a set of IT facilities that are as long as to a customer over a network on adhoc basis and with the ability to scale up or down their service requirements. Generally cloud computing services are distributed by a third party provider who owns the groundwork. Its advantages to mention but some include scalability, flexibility,resilience, efficiency & outsourcing noncore actions. This paper will converse secure merged query handing out with map Reduce & Hadoop. Security is one of thekey issueswhich block the development of cloud. Even with the potential advantages achieved from the cloud computing, the organizations are unhurried in accepting it due to security issues and dares associated with it. The idea of handling over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a comprehensiveanalysis of the cloud computing security issues and tasks focusing continuouslyon the
cloud computing types and the service delivery types. This paper describes our approach to securing the cloud.
Keywords
Full Text:
PDFReferences
Microsoft. Multi-Tenant Data Architecture
2010 Oct. Available from:
http://msdn.microsoft.com/enus/
library/aa479086.aspx
Amazon. Amazon EC2 SLA. 2010 Oct.
Available from: http://aws.amazon.com/ec
-sla/
Mell P, Grance T. The NIST Definition of
Cloud Computing. USA: National Institute
of Standards and Technology; 2009.
Available from: http://www.wheresmyserv
er.co.nz/storage/media/faq-files/cloud-defv15.
pdf (accessed April 2010).
Jensen M, Schwenk J, Gruschka N, et al.
On Technical Security Issues in Cloud
Computing. Proceedings of the IEEE
International Conference on Cloud
Computing; 2009 Sep 21–25; Bangalore,
India. 109–16p.
Wenjun Z. Integrated Security Framework
for Secure Web Services. Proceedings of
the Third International Symposium on
Intelligent Information Technology and
Security Informatics; 2010 Apr 2–4;
Jinggangshan, China. USA: IEEE. 178–
p.
Wang B, He H, Yuan LX, et al. Open
Identity Management Framework for SaaS
Ecosystem. Proceedings of the IEEE
International Conference on e-Business
Engineering; 2009 Oct 21–23; Macau,
China. USA: IEEE. 512–17p.
Subashini S, Kavitha V. A survey on
security issues in service delivery models
of cloud computing. Journal of Network
and Computer Applications. vol. (In
Press), Corrected Proof.
Fong E, Okun V. Web Application
Scanners: Definitions and Functions.
Proceedings of the 40th Hawaii
International Conference on System
Sciences (HICSS 2007); 2007 Jan 3–6;
Waikoloa, USA. USA: IEEE. 280b-280b.
NIST. National Vulnerability Database
(NVD). 2010 October. Available from:
http://nvd.nist.gov/home.cfm
OWASP. The Ten Most Critical Web
Application Security Vulnerabilities. 2010.
Available from: http://www.owasp.org/ind
ex.php/OWASP_Top_Ten_Project
Refbacks
This site has been shifted to https://stmcomputers.stmjournals.com/