Cloud Computing : Security Issues And Resource Allocation Policies

Author(s):  
Gaurav Sharma ◽  
Urvashi Garg, A.P ◽  
Arun Jain, A.P ◽  
Loveleena Mukhija, A.P

Cloud computing is the combination of distributed computing, grid computing and parallel technologies which define the shape of a new era. In this technology client data is stored and maintain in the data center of a cloud provider like Google, Amazon and Microsoft etc. It has inherited the legacy technology and including unique ideas. Industries, such as education, banking and healthcare are moving towards the cloud due to the efficiency of services such as transactions carried out, processing power used, bandwidth consumed, data transferred etc. There are various challenges  for adopting cloud computing such as privacy ,interoperability, managed service level agreement (SLA) and reliability. In this paper we survey challenges in resources allocation and the security issues of the cloud environment.

2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


Author(s):  
Marcus Tanque

Converging Cloud computing with Internet of Things transformed organizations' traditional technologies. This chapter examines the intersection of cloud computing and internet of things in consort with how these solutions often interact on the internet. Vendors develop CloudIoT capabilities to support organizations' day-to-day operations. IoT is a combined platform encompassing physical and virtual nodes. IoT objects comprise device-to-device data sharing, machine-to-machine provisioning, sensors, actuators, and processors. These systems may be deployed as hardware components and applications software. This chapter also emphasizes data security, reliability, resource provisioning, service-level agreement, quality of service, IoT, privacy, and device integration. This chapter also highlights operational benefits and/or security issues affecting CC and IoT technologies.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


2019 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Jauharul Mafakhiri

Intisari— Permasalahan pada penelitian ini adalah mengenai pengujian virtual machine di tingkat fungsionalitas aplikasi pada lingkungan komputasi awan di antara dua cloud provider IaaS (Infrastructure as a Service). Tujuan dari pengujian fungsionalitas ini adalah untuk mengetahui tingkat interoperabilitas aplikasi dalam sistem virtual machine yang berpindah dari sebuah cloud provider ke cloud provider lain, yaitu migrasi dari Amazon EC2 ke VMWARE. Peneliti memiliki ketertarikan mengenai pengujian migrasi ini sebab perkembangan Internet menjadi semakin pesat, dan diiringi dengan meningkatnya jumlah aplikasi yang memanfaatkan teknologi komputasi awan itu, sementara kemampuan proses bisnis suatu aplikasi semakin bertambah, fitur layanan yang ditawarkan para pihak cloud provider menjadi semakin baik (dari sisi harga menjadi lebih murah, performansi sistem menjadi lebih tinggi, sistem menjadi lebih handal, pemanfaatan kecanggihan teknologi security terbaru, maupun Service Level Agreement (SLA) menjadi lebih baik), maka memungkinkan untuk berpindah layanan ke cloud provider lain, namun di sisi praktik sering terjadi kegagalan fungsionalitas aplikasi dalam proses migrasi ke sistem cloud yang lain, yang antara lain disebabkan oleh masalah ketergantungan terhadap penyedia layanan komputasi awan (vendor lock-in). Masalah ketergantungan ini muncul disebabkan oleh jumlah cloud provider semakin bertanbah banyak dan mempunyai standar tersendiri dalam pembangunan sistemnya, sehingga dapat mengakibatkan kemampuan migrasi antar cloud itu dapat memiliki keterbatasan untuk hal-hal tertentu. Dengan 28 test case pengujian atas fitur-fitur pada aplikasi website ujian online yang diuji pada penelitian ini, diperoleh hasil tingkat interoperabilitas migrasi dari Amazon EC2 ke VMWARE memiliki nilai sebesar 46.43%. Kata kunci— pengujian, fungsionalitas, komputasi, awan, migrasi, interoperabilitas.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.


Author(s):  
Haider Abdul Hassan Hadi Al Kim ◽  
Shouman Barua

Future fit demand and flexible solutions combined with high quality of services that is what latest information technology by cloud computing stands for. In the last couple of years, many scientists and researchers have improved computing systems that result in it more users’ friendly day by day from all perspectives. Nowadays, computing system promises to fulfill maximum outcome using minimum efforts or resources from user’s point of view, and it comes from overcoming several technological eras like cluster computing, grid computing, etc. It is obvious that as more the technology advances, the complexity also increases in terms of privacy, security, and service quality. Recently business applications want services being delivered instantly. Pay-as-you-go is the latest trend for most of the business applications and to suit it precisely a process should be followed which might be the Service Level Agreement (SLA). In this paper, we started with defining cloud computing and how it defers from traditional computing system. We also compile the format and parameters of estimating SLA for cloud computing in order to be benefited maximum from it in terms of users’ as well as providers’ perspective


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Sign in / Sign up

Export Citation Format

Share Document