scholarly journals Trusted Cloud Platform for Cloud Infrastructure

2013 ◽  
Vol 10 (8) ◽  
pp. 1884-1891
Author(s):  
Punit Gupta ◽  
Deepika Agrawal

Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not qualify cloud computing environment requirements. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values,  trust based scheduling and load balancing  is done for better allocation of resources and enhancing the QOS of services been provided to the users. In this paper, an trust based cloud computing framework is proposed using trust model ,trust based scheduling and load balancing algorithms. Here we describe the design and development of trusted Cloud service model for cloud Infrastructure as a service (IaaS) known as VimCloud .VimCloud an open source cloud computing framework that implements the tusted Cloud Service Model and  trust based scheduling and load balancing algorithm . However one of the major issues in cloud IaaS is to ensure reliability and security or used data and computation. Trusted cloud service model ensures that user virual machine executes only on trusted cloud node, whose integrity and reliability is known in term of trust value . VimCloud shown practical in term of performace which is better then existing models.

2019 ◽  
Vol 8 (3) ◽  
pp. 5159-5163

The rapidly growing cloud-centric focuses among organizations and enterprises have thrown into sharp relief the pressing need to progressively upgrade security within a cloud infrastructure. While a significant portion of threat perception emanates from malicious software that can infiltrate a cloud computing infrastructure, the risk of unlicensed software deployments in infrastructure-as-a-service model can expose an affected cloud service provider to a host of legal and statutory issues. The task of managing software licenses and conducting license validation checks can be an intense activity. The onus of tracking and managing licenses of software that have been deployed on an infrastructure-as-a-service cloud model is on both cloud service provider as well as its customers. However, the business of effectively managing software licenses is contingent upon the ease and use of an effective license auditing management tool to which auditors can connect through a secure conduit. In this paper, we propose a model that would allow cloud service providers to securely track software deployments and tally corresponding usage of appropriate licenses within an infrastructure-as-a-service model. Using the proposed model a cloud service provider can match all software licenses that have been deployed by a customer within the IaaS cloud space allotted. Further, a license auditor can securely connect to cloud service provider’s console and generate reports on license usage and software deployments from any modern browser. At the core of our model, lies a secure loopback connection framework that prevents access to any other web site once a secure connection to the primary console for monitoring and tracking software deployments has been established.


10.29007/q5bd ◽  
2019 ◽  
Author(s):  
Maryam Alruwaythi ◽  
Krishna Kambhampaty ◽  
Kendall E. Nygard

Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.


2018 ◽  
Vol 3 (1) ◽  
pp. 19 ◽  
Author(s):  
Matheus Alvian Wikanargo ◽  
Novian Adi Prasetyo ◽  
Angelina Pramana Thenata

AbstrakTeknologi cloud computing pada era sekarang berkembang pesat. Penerapan teknologi cloud computing sudah merambah ke berbagai industri, mulai dari perusahaan besar hingga perusahaan kecil dan menengah. Perambahan cloud computing di perindustrian berupa implementasi ke dalam sistem ERP. Namun, penetrasi teknologi ini dalam lingkup perusahaan kecil dan menengah (UKM) masih belum sekuat perusahaan besar. Penerapan ERP berbasis cloud computing yang masih tergolong baru tentu memiliki keuntungan dan penghambat yang mempengaruhi kinerja perusahaan. Hal tersebut menjadi salah satu pertimbangan UKM masih enggan menggunakan teknologi ini. Penelitian ini akan menganalisis framework yang paling sesuai untuk UKM dalam menerapkan sistem ERP berbasis cloud computing. Framework yang dianalisa yaitu Software as a Service (SaaS), Infrastructure as a Service (IaaS), dan Platform as as Service (PaaS). Ketiga framework ini akan dibandingkan menggunakan metode studi literatur. Tolak ukur yang menjadi acuan untuk perbandingan adalah Compatibility, Cost, Flexibility, Human Resource, Implementation, Maintenance, Security, dan Usability. Faktor-faktor tersebut akan diukur keuntungan dan penghambatnya jika diterapkan dalam SME. Hasil dari penilitian ini adalah Framework SaaS yang paling cocok untuk diterapkan pada perusahaan kecil dan menengah. Kata kunci— Cloud Computing, UKM, SaaS, IaaS, PaaS 


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


2014 ◽  
Vol 513-517 ◽  
pp. 1425-1430
Author(s):  
Xiu Zhen Feng ◽  
Peng Hao

Cloud computing technology created a brand new approach for further information resources management and utilization. Based on exploring characteristics and applications of cloud computing technology, the study in this paper is focused on cloud service with information resources. The aim of this study is to construct a cloud service model, namely Information Resource as a Service (IRaaS). Our model depicts the components of IRaaS and relationships among those components, which builds up a prime foundation for further studying on both information resource management and service.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2015 ◽  
Vol 7 (1) ◽  
Author(s):  
Endang Wahyu Pamungkas ◽  
Divi Galih Prasetyo Putri

Recently cloud computing technology has been implemented by many companies. This technology requires a really high reliability that closely related to hardware specification and management resource quality used. Adequate hardware would make resource allocation easier. On the other hand, resource allocation will be harder if the resources are limited. This is a common condition in a developing cloud service provider. In this paper, a load balancing algorithm to allocate resources in cloud computing environment that has limited resources has been proposed. This algorithm is developed by taking the advantages of the existing algorithms, Equally Spread Current Execution and Throttled. We merge those algorithm without losing the advantages and we try to eliminate the shortcoming of each algorithm. The result shows that this algorithm is able to give a significant improvement in the limited resources environment. In addition, the algorithm also able to compete with the other algorithm in the more adequate resource environment. Based on the consistent results, this algorithm is expected to be more adaptive in different resources environment.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


Author(s):  
G. Soniya Priyatharsini ◽  
N. Malarvizhi

Cloud computing is a service model in internet that provides virtualized resources to its clients. These types of servicing give a lot of benefits to the cloud users where they can pay as per their use. Even though they have benefits, they also face some problems like receiving computing resources, which is guaranteed on time. This time delay may affect the service time and the makespan. Thus, to reduce such problems, it is necessary to schedule the resources and then allocate it to using an optimized hypervisor. Here, the proposed method is used to do the above-mentioned problem. First, the available resources are clustered with respect to their characteristics. Then the resources are scheduled using this method. Finally, with respect to that of the clients request the resources, the resources are allocated. Here, the cost is the fitness of the allocation.


2016 ◽  
pp. 2096-2121
Author(s):  
Ute Riemann

Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.


Sign in / Sign up

Export Citation Format

Share Document