Review of Cloud Computing
Review of Cloud Computing
Review of Cloud Computing
ABSTRACT
Cloud computing has formed the conceptual and
infrastructural basis for tomorrows computing. The
global computing infrastructure is rapidly moving
towards cloud based architecture. While it is important
to take advantages of could based computing by means
of deploying it in diversified sectors, the security aspects
in a cloud based computing environment remains at the
core of interest. Cloud based services and service
providers are being evolved which has resulted in a new
business trend based on cloud technology. With the
introduction of numerous cloud based services and
geographically dispersed cloud service providers,
sensitive information of different entities are normally
stored in remote servers and locations with the
possibilities of being exposed to unwanted parties in
situations where the cloud servers storing those
information are compromised. If security is not robust
and consistent, the flexibility and advantages that cloud
computing has to offer will have little credibility. This
paper presents a review on the cloud computing concepts
as well as security issues inherent within the context of
cloud computing and cloud infrastructure.
Keywords- cloud computing, cloud security, cloud
network, cloud services
1. INTRODUCTION
1.1 CLOUD COMPUTING
Cloud computing, also known as 'on-demand
computing', is a kind of Internet-based computing, where
shared resources, data and information are provided to
computers and other devices on-demand. It is a model
for enabling ubiquitous, on-demand access to a shared
pool of configurable computing resources.[1] Recent
developments in the field of could computing have
immensely changed the way of computing as well as the
concept of computing resources. In a cloud based
computing infrastructure, the resources are normally in
someone else's premise or network and accessed
remotely by the cloud users. Processing is done remotely
implying the fact that the data and other elements from a
person need to be transmitted to the cloud infrastructure
or server for processing; and the output is returned upon
completion of required processing. In some cases, it
www.ijsret.org
74
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 2, February 2016
3. CLOUD CLIENT
Users access cloud computing using networked client
devices,
such
as desktop
computers, laptops, tablets and smart phones and any
Ethernet enabled device such as Home Automation
Gadgets. Some of these devicescloud clients rely on
cloud computing for all or a majority of their
applications so as to be essentially useless without it.
Examples are thin clients and the browser-based Chrome
book. Many cloud applications do not require specific
software on the client and instead use a web browser to
interact
with
the
cloud
application.
With Ajax and HTML5 these Web user interfaces can
achieve a similar, or even better, look and feel to native
applications. Some cloud applications, however, support
specific client software dedicated to these applications
(e.g., virtual desktop clients and most email clients).
Some legacy applications (line of business applications
that until now have been prevalent in thin client
computing) are delivered via a screen-sharing
technology. [7]
www.ijsret.org
75
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 2, February 2016
6. CONCLUSION
5.2 Physical security
Cloud service providers physically secure the IT
hardware (servers, routers, cables etc.) against
unauthorized access, interference, theft, fires, floods etc.
and ensure that essential supplies (such as electricity) are
sufficiently robust to minimize the possibility of
disruption. This is normally achieved by serving cloud
applications from 'world-class' (i.e. professionally
specified, designed, constructed, managed, monitored
and maintained) data centers.
5.3 Personnel security
Various information security concerns relating to the IT
and other professionals associated with cloud services
are typically handled through pre-, para- and post-
www.ijsret.org
76
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 5, Issue 2, February 2016
REFFERENCES
[1] Hassan, Qusay (2011). "Demystifying Cloud
Computing" The Journal of Defense Software
Engineering (Cross Talk) 2011 (Jan/Feb): 1621.
Retrieved 11 December 2014.
[2] Monjur Ahmed and Mohammad Ashraf Hossain
International Journal of Network Security & Its
Applications (IJNSA), Vol.6, No.1, January 2014
[3]http://en.wikipedia.org/wiki/Cloud_computing
[4] Amies, Alex; Sluiman, Harm; Tong, Qiang Guo; Liu,
Guo Ning (July 2012). "Infrastructure as a Service Cloud
Concepts". Developing and Hosting Applications on the
Cloud
[5]Boniface, M.; et al. (2010), Platform-as-a-Service
Architecture for Real-Time Quality of Service
Management in Clouds, 5th International Conference on
Internet and Web Applications and Services (ICIW),
Barcelona,
Spain:
IEEE,
pp. 155160,
doi:10.1109/ICIW.2010.91
[6] Hamdaqa, Mohammad. A Reference Model for
Developing Cloud Applications
[7]"https://en.wikipedia.org/wiki/Cloud_computing"
[8]Torry harris"Cloud Computing An Overview"
[9] "Identity Management in the Cloud" Information
Week. 2013-10-25. Retrieved 2013-06-05.
www.ijsret.org
77