The name comes from the use of clouds as an abstraction for the complex infrastructure it contains in system diagrams (Gruman, 2008).
cloud computing entrusts services with a user’s data, software and computation over a network. Cloud computing can be public or private or hybrid. In public cloud, applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model.
Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered).
private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally (Ryan, 2011).
Undertaking a private cloud project requires a significant level and degree of engagement to virtualize the business environment, and it will require the organization to reevaluate decisions about existing resources.
The Essay on Public Vs Private
When we started talking about private vs. public schools in class a lot of feelings were running high I thought. I also thought that not enough of us knew enough to make a knowledgeable judgment. Here is some pro and cons to let you know the truths about private schools and maybe some falsehoods you thought to be true. Some people say private schools offer superior education. To a point this is ...
When it is done right, it can have a positive impact on a business, but every one of the steps in the project raises security issues that must be addressed in order to avoid serious vulnerabilities. While Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models (Ryan, 2011).
As cloud computing is achieving increased popularity, also is the security security issues increasing. 1. 1 Background of study
In just a few years, cloud computing platforms and services have dramatically changed the landscape of software application development. (Voorsluys, etal 2011) The emergence of the Cloud system has simplified the deployment of large-scale distributed systems for software vendors. The Cloud system provides a simple and unified interface between vendor and user, allowing vendors to focus more on the software itself rather than the underlying framework. Applications on the Cloud include Software as a Service system and Multi-tenant databases.
The Cloud system dynamically allocates computational resources in response to customers’ resource reservation requests and in accordance with customers’ predesigned quality of service ( Armbrust, etal 2010).
Conceptually, cloud computing makes sense: business managers love the return on investment, and developers love the freedom from infrastructure code. But many shops still are struggling with whether or not to move to cloud platforms. (Patterson,2010).
Data security is one of the main concerns for an organization considering migrating its software to a cloud infrastructure.
The more sensitive the data is, the more reason there is for concern. Cloud computing doesn’t exactly introduce new data security concerns; in most cases, it just amplifies them. Putting data in the cloud(whether private or public cloud) potentially exposes it to a larger audience, which is usually a good thing. But if the data exposed is meant to be private, or only conditionally accessed, then the results could be catastrophic. The fundamental issue with cloud computing is that it removes entrusted data from a developer or sys-admin’s immediate control.
Rather than being stored and managed locally, data in the cloud is stored on distributed devices that could be located anywhere, and conceivably accessed by anyone. (Baburajan, 2010).
The Research paper on Vulnerability in Cloud Computing
... data. G.Unknown Risk Profile It is important for the users to know software versions, security practices, code updates and intrusion attempts. While adopting cloud computing ... to remotely exploit vulnerabilities in these systems and applications is a significant threat to virtualized cloud computing environments [7]. In addition, co-location ...
Risk coming with opportunity, the problem of data security in Cloud computing become bottleneck of cloud computing. As software developers, it’s important that we understand both the real security risks of cloud computing and the realistic approaches to solving at least some of these concerns. 1. 2 Statement of problem
This project work was inspired by the issues of data security in cloud computing which have been the main concerns for an organization considering migrating its software to a cloud infrastructure. 1. 3 Objective of the Study This Project work is aimed at achieving the following. 1. Design application that will authenticate users in private cloud computing system 2. Design an application that will be use in encrypting file that could be stored in private cloud environment. 1. 4 Significance of the Study
This research will help convince many organizations to consider migrating their software to a cloud infrastructure and enjoy the advantage of cloud computing. 1. 5 Scope of the Study The work covers file and database data encryption in private cloud computing. 1. 6 Limitations of the Study The following are constraint that affected us; There is limitation to resources for the research work; * Regular power failure; 1. 7 Definition of Terms Cloud computing: It simply means storing “stuffs” in the cloud.
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing entrusts services with a user’s data, software and computation over a network. In other words, Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet).
The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams.
Cloud: the term cloud refers to servers on the internet. Client–server computing: This refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients).
Cloud environment: Cloud environment is a dynamic environment, where the user’s data transmits from the data centre to the user’s client Encryption: Encryption is the process of transforming plain, human-readable text into unreadable text.
The Essay on Cloud computing Service
... the cloud computing service. There are three types of service provider by cloud computing models. One is software as a service or SaaS, this service provides ... to allow data, and also applications to move them from one cloud to another. The advantage of using cloud-computing service is ... maintenance. Consumers will need a reliable internet connection server at all times, but will be consistently be ...
Secure Cloud computing: Secure Cloud computing enables organizations to effectively respond to changing business requirements without increasing the risk of data theft or loss. Virtual Machine technology: This is a technology that allows the operation of the server which is not dependent on the physical device, but on the virtual servers. In virtual machine or servers, a physical change or migration does not affect the services provided by the service provider.