Cloud Computing Diagnosis

Author(s):  
N. Krishnadas ◽  
R. Radhakrishna Pillai

Cloud Computing is emerging as a promising cost efficient computing paradigm which professionals believe is an absolutely new trend and will represent next level of internet evolution. Though the presence of Cloud computing is ubiquitous, it still lacks consensus on a proper definition and classification of the major Clouds in effect today. It also suffers from major criticism of being a hype/fad and some researchers claim that it is just an extension of already established computing paradigms. This chapter attempts to deal with such criticisms by comprehensively analyzing the Cloud definitions and diagnose the components of the same. It performs a comprehensive study of more than 30 definitions given by Cloud computing professionals and published in research papers. These definitions are then analyzed under more than fifteen components, each of which is discussed in the chapter. This study is backed by empirical work, to understand Cloud computing from different angles and come up with a comprehensive definition. It also analyses the present Cloud service providers and the level of services they provide to bring about a clear picture of Cloud computing. Based on the comparison, the pending issues in Cloud computing are discussed.

Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don’t support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of information in cloud forensic investigations. Generally, Cloud service providers have access to activity logs of cloud user and CSP can tamper the logs so that investigator cannot reach to the real culprit. In such an environment, log security is one of challenge in the cloud. Logging technique is used to monitor employee’s behavior, to keep track of malicious activities and prevent cloud networks from intrusion by well-known organizations. Ensuring the reliability and integrity of logs is crucial. Most existing solutions for secure logging are designed for traditional systems rather than the complexity of a cloud environment. In the proposed framework secure logging environment is provided by storing and processing activity logs and encrypting using advanced encryption method. It detects DDoS (distributed denial of service) attack on cloud infrastructure by using the published logs on cloud and thus helpful in cloud forensics. It is detected by the investigator using available application activity logs in the cloud server. Searchable encryption algorithm will be used to increase the security of the logging mechanism and to maintain confidentiality and privacy of user data. Proof of past (PPL) logs is created by storing logs at more than one place. This PPL helps in the verification process of changed logs by CSP the actual implementation of this application on AWS Infrastructure as a service ( IAAS ) cloud shows real-time use of this structure


2015 ◽  
Vol 64 (8/9) ◽  
pp. 567-582 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The paper aims to examine the characteristic elements of various organizational factors to identify whether a favourable climate for implementing and sustaining cloud computing in Banaras Hindu University library system (BHULS) existed. Design/methodology/approach – After reviewing relevant literature on the topic, a list of 20 factors that affected an organization’s adoption to innovation was prepared. A questionnaire was personally administered to the library professionals engaged in BHULS. Respondents were asked to nominate the level of importance of each factor for validation of cloud computing adoption. Findings – Findings of the paper validate the fact that opportune time for the implementation of cloud computing existed in BHULS. Library staff showed high willingness toward the adoption of the cloud computing and were well prepared to grasp the challenges. Practical implications – The paper establishes the fact that the benefits of cloud computing are inadequate to convince organizations to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – Because no empirical study on the cloud computing in conjunction with academic libraries of India has been carried out before, this paper closes this gap and provides guidelines to migrate to cloud environment. Also, it provides the perceptions of library professionals in response to its adoption.


Author(s):  
Ishan Senarathna ◽  
Carla Wilkin ◽  
Matthew Warren ◽  
William Yeoh ◽  
Scott Salzman

Cloud computing is a recent computing paradigm enabling organizations to have access to sophisticated computing services via the Internet on a fee-for-service basis. It provides Small and Medium-sized Enterprises (SMEs) with opportunities to become as technologically advanced as their larger counterparts, without significant financial outlays. This paper examined the important factors that influence SMEs’ adoption of cloud computing technology. Drawing upon aspects of the Technology, Organization and Environment framework and Diffusion of Innovation Theory, we developed a research model of SMEs’ adoption of cloud computing and tested it through an online survey of 149 Australian SMEs. Data was analyzed using multiple regression methods, with results showing that SMEs were influenced by factors related to advantaging their organizational capability (i.e., relative advantage, quality of service and awareness) rather than risk-related factors (i.e., security, privacy and flexibility). The findings offer insights to SMEs owners, Cloud service providers and government in establishing Cloud computing adoption strategies for SMEs.


Author(s):  
Sapana Sanjay Bhuskute ◽  
◽  
Sujata Kadu ◽  

Federated cloud computing is the advancement in the area of the general cloud computing paradigm. In a federated cloud environment, multiple cloud service providers share their computing assets, servers, and various facilities to fulfill customer demands. Federated cloud computing terminology consists of the aggregation of services considered by interoperability characteristics and creates the integration of several cloud service providers regardless of any geographical location. It improves the performance, utilization of facilities, minimizes response time and pricing model by partial subcontracting various computing resources and facilities from the nearby cost-efficient province. Customers also get profited from service level agreements signed between the cloud service providers through intermediator cloud brokers. This work aims to survey the federated cloud environment, its various architectural types, advantages associated with the federation, challenges associated with a federated cloud environment, and future research directions in the federated cloud computing research area.


End the age of digitalization, data generated from numerous online and offline sources in every second. The Data are having a considerable amount of size and several properties termed as Bigdata. It is challenging to store, manage processes, analyze, visualize, and extract useful information from Bigdata using traditional approaches in local machines. To resolve this cloud computing platform is the solution. Cloud computing has high-level processing units, storage, and applications that do not depend on user devices' performance. Many users can access resources and demanded services remotely from the cloud on a pay-as-use basis. That is why users are not needed to buy and install costly resources locally. Some cloud services providers are Google, AWS, IBM, and Microsoft, and they have their Bigdata analyzing robust systems and products in a cost-efficient manner. There are many Cloud Service Providers (CSP's) having different services of Bigdata analyzing filed. However, we discuss in the paper about an excellent service BigQuery in the Data warehouse product of Google to analyze and represent numerous samples of datasets in real-time for making the right decisions within a short time.


2016 ◽  
Vol 65 (1/2) ◽  
pp. 33-51 ◽  
Author(s):  
Mayank Yuvaraj

Purpose – The purpose of this paper is to explore the perceptions of librarians engaged in Indian academic libraries towards cloud computing. Design/methodology/approach – A structured questionnaire was used to collect responses from the library professionals engaged in Indian academic libraries. Overall, 339 respondents participated in the survey. Descriptive survey method was used in the study. Findings – The findings of the study reveal that library professionals are using cloud-computing tools in their daily works. They want to adopt cloud computing in the libraries to improve library services and avoid redundancy of works. Ubiquitous availability, economy and the various service layers are the core drivers of its adoption in the libraries. The respondents showed their concern over security and data privacy in cloud. Practical implications – The study establishes the fact that the benefits of cloud computing are inadequate to convince the libraries to migrate from the traditional computing paradigm to the cloud. Technological advancement may not transform the cloud into a mainstream technology. To motivate the expansion of cloud computing adoption, emphasis has to be laid upon collaboration between the cloud service providers supplemented by solid cloud legislations which need to be worked out. Originality/value – The paper provides the perceptions of library professionals in response to the adoption of cloud computing.


2020 ◽  
Vol 13 (3) ◽  
pp. 313-318 ◽  
Author(s):  
Dhanapal Angamuthu ◽  
Nithyanandam Pandian

<P>Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud. </P><P> Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment. </P><P> Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored. </P><P> Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.</P>


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


Sign in / Sign up

Export Citation Format

Share Document