Cloud Computing and Security Challenges

Only available on StudyMode
  • Topic: Cloud computing, Service level agreement, Grid computing
  • Pages : 13 (4207 words )
  • Download(s) : 157
  • Published : May 15, 2013
Open Document
Text Preview
Cloud Computing and Security Challenges

ABSTRACT

Cloud Computing recently emerged as a promising solution to information technology (IT) management. IT managers look to cloud computing as a means to maintain a flexible and scalable IT infrastructure that enables business agility. In this paper Cloud Computing services including data storage service, cloud computing operating system and software as a service will be introduced, Cloud Computing security challenges will be discussed and Cisco Secure Cloud Data Center Framework will be presented.

Categories and Subject Descriptors C.2.1 [Internet] General Terms Security

Keywords

Cloud Computing, Security

1. INTRODUCTION

In the early years between 1960 and 1961 John McCarthy, an American computer scientist and cognitive scientist, came up with the idea of computer or information utility. In 1961 at MIT Centennial John McCarthy pointed out “If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility... The computer utility could become the basis of a new and important industry.” [1]. Cloud Computing has developed from McCarthy’s idea of utility computing which begins the commoditization process to a new service that is widely available and has become undistinguishable from others like it, which consumers make the decision to purchase it based on price. Cloud Computing has caused a disruptive shift in technology. This shift has and will continue to revolutionize the way businesses acquire and deliver IT services. Business architectures prior to Cloud Computing look towards the cloud infrastructure to update and integrate cloud solutions into their current architectures. Cloud Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACM SE 12, March 29 - 31 2012, Tuscaloosa, AL, USA Copyright 2012 ACM 978-1-4503-1203-5/12/03…$10.00.

Computing provides various services that allow its users to support their businesses, store data, and use cloud services, without investing in new infrastructure, training new personnel, or licensing new software. The cloud infrastructure provides various services in a distributed environment, while sharing resources and the storage of data in a data center. Many different ways to store data via the Internet have been explored. From sites such as flicker which allows users to access photos anywhere, to email accounts, which saves all users incoming and outgoing messages virtually with no loss of the user’s hard disk drive space. The way Cloud Computing operates causes various threats and possible security issues. The internet is the main driver in all operations for Cloud Computing services. The internet is also a host for malicious content and actions such as man-in-the-middle attacks, IP spoofing, etc. The impacts of these threats can range from data leakage to identity fraud. Data privacy and security, external threats, guest-to-cloud threats, other security issues are also becoming very important in Cloud Computing. As increased amounts of data are transmitted over the internet and malicious behavior continues, the protection and defense of data within the cloud will always be present. The rest of the paper is organized as follows. In the next section Cloud Computing services will be introduced. In section 3 Cloud Computing security challenges will be discussed. Section 4 will discuss the security technologies and section 5 will conclude...
tracking img