Professional Documents
Culture Documents
Cloud Computing: History, Architecture, Security Issues: March 2015
Cloud Computing: History, Architecture, Security Issues: March 2015
Cloud Computing: History, Architecture, Security Issues: March 2015
net/publication/323967455
CITATIONS READS
8 14,446
2 authors, including:
Ankur Bang
Centre for Development of Advanced Computing
19 PUBLICATIONS 146 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ankur Bang on 23 March 2018.
Internet is driving force towards the different Cloud Computing SaaS, PaaS, and IaaS. SaaS refers
technologies that have been developed. One of the to Software as a Service in this a system with
most discussed among all of these is Cloud operating systems, hardware and network provided or
Computing. Over the last few years, cloud computing we can say a pre developed system. PaaS refers to
paradigm has a drastic and enormous shift towards its Platform as a Service in this the operating system,
adoption and it has become a new trend in hardware and network are provided and customer/user
Information Technology as it promises significance installs or develops its own software. And IaaS refers
cost reduction and new business potential to its users to Infrastructure as a Service in this the customer has
and providers. In order to define Cloud Computing, it the knowledge about all the stuff. There are no
is first necessary to explain what is mean by the publically available standards specific to cloud
phrase “The Cloud”. The first reference to “The computing security. In this paper we propose the
Cloud” originated from the telephone industry in following standards for maintaining security in an
unsafe environment.
1990s, when Virtual Private Network (VPN) service
was first offered. This VPN service was used By Main characteristics include:
providers along with customer, telephone companies
despite of using hard wire data circuits to transmit i. Broad network access: Ability to access the
data. This allowed provides and customers to offer the service via standard platform like desktop,
same amount of band width at a lower cost by laptop, mobile etc.
rerouting the network traffic in real time to
accommodate ever-changing network utilization. The ii. Resource pooling: Resources are pooled
term “Cloud” in phrase Cloud Computing refers to the across multiple customers.
internet and its infrastructure. Cloud computing is in
general sense on demand utility computing for anyone iii. Rapid elasticity: capability to cope with
with access to cloud. The advantages of cloud demand peaks.
102
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE
CONVERGENCE 2015”, 28 March 2015
103
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
No need for frequent software up-gradation. Multiple users or customers can access on
Application Programming Interface (APIs) same hardware.
allows integration of different pieces of
software. Used for that software which are Scalable.
used for short term Example: collaboration
software in any project No need of administration.
104
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
Platform Management
Data Encryption It is the key technology for data security. That is data
105
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
in motion and in rest encryption. Security can range Significant saving in the energy of a cloud data center
from simple all the way to highly secure. For example without sacrificing SLA are an excellent economic
the web services APIs that we use to access the cloud, incentive for data center operators and would also
either programmatically or with clients written to make a significant contribution to greater
those APIs, provide SSL encryption for access, this is environmental sustainability. It has been estimated
generally considered to be a standard. that the cost of powering and cooling accounts for
53% of the total operational expenditure of data
Cloud Data Management & Security: centers. The goal is not only to cut down energy cost
in data centers, but also to meet government
Cloud data can be very large, unstructured and regulations and environmental standards. Designing
typically append only with rare updates. Cloud data energy-efficient data centers has recently received
management is an important research topic in cloud considerable attention. This problem can be
computing. Since service providers typically do not approached from several directions. For example,
have access to the physical security system of data energy efficient hardware architecture that enables
centers, they must rely on the infrastructure provider slowing down CPU speeds and turning off partial
to achieve full data security. For a virtual private hardware components has become commonplace.
cloud, the service provider can only specify the
security setting remotely, without knowing whether it
is fully implemented. Multi-tenancy:
There are number of types of cloud applications that
Migration of virtual Machines: (1)
The major advantage of VM (Virtual Machine) user can access through internet, Internet, from small
migration is to avoid hotspots, however this is not Internet-based widgets to large enterprise software
straightforward. These Applications are not hardware applications that have increased security requirements
specific; various programs may run on one machine based on the type of data being stored on the software
using virtualization or many machines may run one vendor’s infrastructure. These application requests
program. Virtualization can provide significant require multi-tenancy for many reasons, the most
benefits in cloud computing by enabling virtual important is cost. Multiple customers accessing the
machine migration to balance load across the data same hardware, application servers, and databases
center. In addition, virtual machine migration enables may affect response times and performance for other
robust and highly responsive provisioning in data customers. For application-layer multi-tenancy
centers. specifically, resources are shared at each
infrastructure layer and have valid security and
Interoperability: performance concerns.
This is the ability of two or more system to work
together in order to exchange the information and use Server Consolidation:
that information. The lack of integration between Server consolidation is an effective approach to
these networks makes it difficult for organizations to maximize resource utilization while minimizing
combine their IT systems in the cloud and realize energy consumption in a cloud computing
productivity gains and cost savings. There are many environment. The increased resource utilization and
public cloud networks are configured as closed reduction in power and cooling requirements achieved
systems and are not designed to interact with each by server consolidation are now being expanded into
other. the cloud. The VM migration technology is often used
to consolidate VMs residing on multiple under-
Access Controls: utilized servers onto a single server, so that the
remaining servers can be set to an energy-saving state.
Identity management and authentication is more The problem of optimally consolidating servers in a
important than anything. And, it is not really all that data center is often formulated as a variant of the
different. What level of enforcement of password vector bin-packing problem; various heuristics have
strength does the service provider invoke, the been proposed for this problem. Additionally,
recovery methodology for password and account dependencies among VMs, such as communication
name. And how are password delivered to users upon requirements, have also been considered recently.
change. This is not all that different from how you
secure your internal systems and data, and it works
the same way, if you use strong passwords, changed Reliability & Availability of Service:
frequently, with typical IT security processes, you
will protect that element of access. The reliability comes into picture when a cloud
provider delivers on demand software as a service.
The software most includes reliability quality so that
Energy Management: users can access it under any network condition.
106
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
There are few cases identified due to the unreliability computing and its approaches, we got to know that the
of on-demand software. Example includes Apple’s study of this topic is in depth and range of application
areas will continue to increase. From this we
MobileMe cloud service, which stores and understand that the cloud computing have major
synchronizes data across multiple devices. impact on society and business. Also we get to know
that there are many new technologies emerging at a
rapid rate; each with technological advancements and
Platform Management: with the potential of making human’s lives easier.
One of the most important parts of cloud platforms This paper presents the overview of cloud computing
provide various kind of platform for developers to and the various cloud service models along with
write applications that run in the cloud, or use services different types deployment model. Cloud computing
provided from the cloud, or both. There are many has the potential to become a frontrunner in
challenges in delivering middleware capabilities for promoting a secure, virtual and economically viable
building, deploying, integrating and managing IT solution in the future.
applications in a multi-tenant, elastic and scalable 7. ACKNOWLEDGMENTS
environments. Different names are used for this kind
of platform today, including on-demand platform and The real spirit of achieving a goal is through the way
platform as a service (PaaS). This new way of of excellence and lustrous discipline. I would have
supporting applications has great potential. When a never succeeded in completing my task without the
development team creates an on-premises application cooperation, encouragement and help provided to me
(i.e., one that will run within an organization), much by various personalities.
of what that application needs already exists. An
operating system provides basic support for executing I would like to take this opportunity to express my
the application, interacting with storage, and more, heartfelt thanks to my guide Prof. Ankur. O. Bang
while other computers in the environment offer for his esteemed guidance and encouragement,
services such as remote storage. especially through difficult times. His suggestions
broaden my vision and guided me to succeed in this
5. FUTURE SCOPE OF CLOUD COMPUTING work. I am also very grateful for his guidance and
learnt many things under his leadership.
As we know cloud computing has become an
important part of our daily life. With the invention of I extend my thanks to Prof. V. P. Narkhade, Head
this, the conventional view of computing has been of Computer Science & Engineering Department,
changed. Due to the positive response of the users Pankaj Laddhad Institute of Technology and
because of its user friendly and easy configuration Management Studies, Buldana for their valuable
techniques; the future of cloud computing seems very support that made me consistent performer.
bright. The future of cloud computing is becoming
bright due to: the presence of High Speed internet I also extend my thanks to Dr. P. M. Jawandhiya,
becoming cloud computing more important. We are Principal, Pankaj Laddhad Institute of Technology
getting closer because the world has been globalised and Management Studies, Buldana for their
due to the internet facility through satellites. From encouragement.
some organization’s survey, it has been noted that in
next decades 70% of Americans will use its various Also I would like to thanks to all teaching and non
application for personal and official use. The internet teaching and non teaching staff of the department for
is connecting people from one country to another their cooperation and help.
within seconds through various cloud based websites
like Skype, Whats App etc. Some points helps to REFERENCES
boost the cloud computing in future they are, internet, [1] Bhushan Lal Sahu, Rajesh Tiwari “A
entertainment will be unlimited, hardware will be Comprehensive Study on Cloud Computing”
optional, no need of software updates and paperless Volume 2, Issue 9, September 2012 ISSN:2277
work. 128 International Journal of Advanced research
in computer science & software engineering.
[2] Yashpalsinh Jadeja, Kirit Modi “Cloud
6. CONCLUSION Computing - Concepts, Architecture and
Challenges” 2012 International Conference on
In this review paper we have discussed the brief Computing, Electronics and Electrical
concept of cloud computing that is what is the word Technologies [ICCEET].
cloud suggest, its meaning, its computing with [3] Rajleen Kaur, Amanpreet Kaur, “A Review Paper
environment along with history of cloud computing, on Evolution of Cloud Computing, its
characteristics. As we have studied about the cloud Approaches and Comparison with Grid
107
International Journal of Advent Research in Computer and Electronics (IJARCE)
(E-ISSN: 2348-5523) Special Issue
National Conference “CONVERGENCE 2015”, 28 March 2015
Computing” Rajleen Kaur et al, /(IJCSIT) Copublished by the IEEE Computer and
International Journal of Computer Science and Reliability Societies, July/August 2009.
Information Technologies, Vol. 5 (5) , 2014,
6060-6063. AUTHORS
[4] M.Sharma, H.Bansal, AK. Sharma, Cloud
Computing: Different Approaches & Security Miss. Swati I. Bairagi Student of
Challenges, International Journal of Soft First year M.E. (Computer Science
Computing and Engineering (IJSCE) ISSN: And Engineering) PLITMS
2231-2307, Volume-2, Issue-1, March 2011. Buldhana- Sant Gadge Baba
[5] Mladen A. Vouk, “Cloud Computing – Issues, Amravati University. Has earned
Research and Implementations”, Proceedings of degree of B.E.(Computer Science
the ITI 2008 30th Int. Conf. on Information and Engineering) from Sant Gadge
Technology Interfaces, June 23-26, 2008, Cavtat, Baba Amravati University in 2014.
Croatia.
[6] Kresimir P; Zeljko H; (2010), “Cloud computing
security issues and challenges”, MIPRO 2010,
May 24-28, 2010, Opatija, Croatia. Prof. A.O.Bang Assistant Professor
[7] Yogesh Bhardwaj, Dr. Manju Kaushik “A Review and M.E. Co-ordinator Computer
Paper on Virtualization and Security in Cloud Science and Engineering
Computing” Volume 4, Issue 3, March 2014 Department, Pankaj laddhad
ISSN: 2277 128X International Journal of Institute of technology and
Advanced Research in Computer management studies, Buldana. Has
Science and Software Engineering. earned M.E. (CSE) from Amravati
[8] John Harauz, Lorti M. Kaunan. Bruce Potter, University, Amravati and
"Data Security in the World of Cloud B.E.(CSE) From Amravati
Computing", IEEE Security & Privacy, university, Amravati
108