scholarly journals A Comparative Analysis of Public Cloud Platforms and Introduction of Multi-Cloud

Author(s):  
Aditi Rajan Khot

Cloud computing is an accepted widely, emerging paradigm for its ‘pay as you go’ approach, massive economies of scale, and global in minutes concept. Over the years, different cloud providers have emerged with various services to meet the requirements of the end-user. Because of an increase in the diversity of services, the complexity increases. Customers cannot decide the optimal service to fulfill their requirements. This paper provides a comparative analysis of services of top public cloud providers namely, AWS, GCP, Oracle, and Microsoft Azure. Public cloud-provider strives to be efficient in every technological aspect, though some are better for certain tasks than others. This paper, as a solution, introduces the concept of Multi-Cloud computing, to leverage the benefits of the different cloud providers and to maximize their utility in single network architecture.

2019 ◽  
pp. 346-375
Author(s):  
Jens Kohler ◽  
Christian Richard Lorenz ◽  
Markus Gumbel ◽  
Thomas Specht ◽  
Kiril Simov

In recent years, Cloud Computing has drastically changed IT-Architectures in enterprises throughout various branches and countries. Dynamically scalable capabilities like CPUs, storage space, virtual networks, etc. promise cost savings, as huge initial infrastructure investments are not required anymore. This development shows that Cloud Computing is also a promising technology driver for Big Data, as the storage of unstructured data when no concrete and defined data schemes (variety) can be managed with upcoming NoSQL architectures. However, in order to fully exploit these advantages, the integration of a trustworthy 3rd party public cloud provider is necessary. Thus, challenging questions concerning security, compliance, anonymization, and privacy emerge and are still unsolved. To address these challenges, this work presents, implements and evaluates a security-by-distribution approach for NoSQL document stores that distributes data across various cloud providers such that every provider only gets a small data chunk which is worthless without the others.


Author(s):  
Jens Kohler ◽  
Christian Richard Lorenz ◽  
Markus Gumbel ◽  
Thomas Specht ◽  
Kiril Simov

In recent years, Cloud Computing has drastically changed IT-Architectures in enterprises throughout various branches and countries. Dynamically scalable capabilities like CPUs, storage space, virtual networks, etc. promise cost savings, as huge initial infrastructure investments are not required anymore. This development shows that Cloud Computing is also a promising technology driver for Big Data, as the storage of unstructured data when no concrete and defined data schemes (variety) can be managed with upcoming NoSQL architectures. However, in order to fully exploit these advantages, the integration of a trustworthy 3rd party public cloud provider is necessary. Thus, challenging questions concerning security, compliance, anonymization, and privacy emerge and are still unsolved. To address these challenges, this work presents, implements and evaluates a security-by-distribution approach for NoSQL document stores that distributes data across various cloud providers such that every provider only gets a small data chunk which is worthless without the others.


2021 ◽  
pp. 63-75
Author(s):  
Darshan Baid ◽  
Pallavi Murghai Goel ◽  
Pragya Bhardwaj ◽  
Astha Singh ◽  
Vishu Tyagi

Author(s):  
Kevin Foltz ◽  
William R. Simpson

The Enterprise Level Security (ELS) model focuses on designing secure, distributed web-based systems starting from basic principles. One area of ELS that poses significant design challenges is protection of web server private keys in a public cloud. Web server private keys are of critical importance because they control who can act as the server to represent the enterprise. This includes responding to requests as well as making requests within the enterprise and to its partners. The cloud provider is not part of this trusted network of servers, so the cloud provider should not have access to server private keys. However, current cloud systems are designed to allow cloud providers free access to server private keys. This paper proposes design solutions to securely manage private keys in a public cloud. An examination of commonly used approaches demonstrates the ease with which cloud providers can currently control server private keys. Two designs are proposed to prevent cloud provider access to keys, and their implementation issues are discussed.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


2021 ◽  
Author(s):  
Ahmed Bentajer ◽  
Mustapha Hedabou ◽  
Sara Ennaama ◽  
Abderrahim Tahiri

The aim of this paper is to propose a model to strengthen the security of key management in cloud computing, where the model is shared or entirely controlled by a non-trusted third party provider. Key management is not a straightforward matter for IT-teams, in addition to critical issues related to properly managing and securing the keys on providers’ infrastructures, they have to deal with concerns specific to multi-cloud key management. Hardware Security Module (HSM) solution that offers a secure on-premise encryption key management turned out be impracticable for widespread cloud deployment. HSM as a Service seems to be the best approach for key management in multi-cloud, but the service is wholly owned and managed by another cloud provider. In This paper, we present an efficient and secure cloud key management that fulfills the requirements of multi-cloud deployment. The proposed design splits the key into a blinded version of n shares that will be stored in encrypted format at the cloud provider side. To demonstrate the efficiency of the proposed design, we implement a fully featured prototype and evaluate its performance. Results analysis shows that the proposed design is highly efficient and can serve as a groundwork for using secret share as a way to protect keys in a multi-cloud environment.


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2016 ◽  
pp. 451-470
Author(s):  
Mohamed Fazil Mohamed Firdhous

This chapter takes a comprehensive look at the strategies and mechanisms developed for evaluating cloud services during business transformation. During business transformation, enterprises need to make decisions that would have long lasting impacts on the performance and profitability of the businesses. One of the important decisions business leaders are required to make is whether to own and manage their own IT infrastructure or outsource them from a public cloud provider. Due to the attractiveness of cloud computing, there are many cloud providers in the market creating a confusion in the minds of the customers who to select. Hence it is necessary to use proper strategies and mechanisms to evaluate the performance and the suitability of the service providers in meeting the customer requirements. This chapter takes an in depth look at some of the strategies, frameworks, mechanisms and tools proposed by researchers for evaluating cloud services in the literature with reference to their applicability, suitability, advantages and disadvantages.


Queue ◽  
2021 ◽  
Vol 19 (1) ◽  
pp. 49-76
Author(s):  
Mark Russinovich ◽  
Manuel Costa ◽  
Cédric Fournet ◽  
David Chisnall ◽  
Antoine Delignat-Lavaud ◽  
...  

Although largely driven by economies of scale, the development of the modern cloud also enables increased security. Large data centers provide aggregate availability, reliability, and security assurances. The operational cost of ensuring that operating systems, databases, and other services have secure configurations can be amortized among all tenants, allowing the cloud provider to employ experts who are responsible for security; this is often unfeasible for smaller businesses, where the role of systems administrator is often conflated with many others.


Sign in / Sign up

Export Citation Format

Share Document