Cloud Security

Although cloud computing has been widely accepted in the enterprise, and its usage is growing exponentially, security and privacy are big challenges for adoption and survival of cloud computing. Security has two facets in the cloud computing landscape, that is there are pros and there are cons. Security is obligatory for all service delivery models of cloud computing. Additionally, cloud deployment options are another orthogonal dimension to the cloud service delivery models. With the adoption of cloud computing, a large part of network, system, applications, and data will move under provider control. The cloud service delivery model will create several virtual perimeters as well as a security model with responsibilities shared between the customer and the provider. This shared responsibility model will bring new security management challenges to the organization. This chapter discusses these issues and enumerates some initiatives to address them.

In this chapter, the authors consider cloud computing as a core topic and various models emerging around it such as its services and delivery models, its economic aspects, applications, usages, challenges, and so on. Cloud computing covers a range of delivery and service models. In this chapter, cloud service delivery models (i.e., Software-as-a-Service, Platform-as-a-Service and Infrastructure-as-a-Service) and cloud deployment models (private cloud, community cloud, public cloud, and hybrid cloud) are described. The right service delivery and deployment option have to be chosen for an organization’s cloud application, according to organizational needs.


2016 ◽  
Vol 9 (17) ◽  
pp. 4726-4750 ◽  
Author(s):  
Salman Iqbal ◽  
Miss Laiha Mat Kiah ◽  
Nor Badrul Anuar ◽  
Babak Daghighi ◽  
Ainuddin Wahid Abdul Wahab ◽  
...  

2015 ◽  
Vol 2015 ◽  
pp. 1-9
Author(s):  
Hui Zhu ◽  
Yingfang Xue ◽  
Xiaofeng Chen ◽  
Qiang Li ◽  
Hui Li

With the pervasiveness of smart phones and the advance of Mobile Internet, more and more Mobile Internet services migrated to the cloud service platform for better user experience. As one of the most indispensable components of the cloud computing infrastructure, virtualization technology has attracted considerable interest recently. However, the flourish of virtualization still faces many challenges in information security. In this paper, we propose a novel architecture, called multilevel and grouping security model for virtualization (V-MGSM), for the security of resources in cloud computing platform. Specifically, to fulfill the balance between information sharing and privacy preservation, the virtual machines (VMs) are divided into diverse groups based on their corresponding entities, and each VM in the same group is assigned to different security level according to security requirements. Besides, the operation between VMs is based on mandatory access control mechanism. Detailed security analysis shows that the proposed V-MGSM can provide a secure communication mechanism for VMs and implement the synchronous updates of the borrowed data. Ultimately, we implement V-MGSM in Xen for experiments, and the results demonstrate that V-MGSM can indeed achieve data security and privacy protection efficiently for Mobile Internet service.


2013 ◽  
Vol 3 (2) ◽  
pp. 35-40
Author(s):  
Carol Dudding

Whether in our professional or private lives, we are all aware of the system wide efforts to provide quality healthcare services while containing the costs. Telemedicine as a method of service delivery has expanded as a result of changes in reimbursement and service delivery models. The growth and sustainability of telehealth within speech-language pathology and audiology, like any other service, depends on the ability to be reimbursed for services provided. Currently, reimbursement for services delivered via telehealth is variable and depends on numerous factors. An understanding of these factors and a willingness to advocate for increased reimbursement can bolster the success of practitioners interested in the telehealth as a service delivery method.


Sign in / Sign up

Export Citation Format

Share Document