Open Access Open Access  Restricted Access Subscription or Fee Access

Security Issues and Milestones in Cloud Infrastructure

S. Subbiah, T. Sowkarthika

Abstract


The computational world is becoming very large and complex. Cloud computing has emerged as a popular computing model to support processing large volumetric data using clusters, commodity computers. Acording J.Dean and s.Ghemawat[1], google currently processes over 20 terabyte of raw web data. Some fascinating large scale processing of data that makes your head spin and appreciate the years of distributed computing fine tuning applied to todays large problems. The evolution of cloud computing can handle such massive data as per on demand service. Nowadays the computational world is opting for pay for use model and hype discussion aside, their remain no concrete definition of cloud computing. I first develop the comprehensive taxonomy for cloud computing architecture and also the security issues in the cloud computing. How we have to secure the data.

Keywords


Highly abstracted resources,flexibility,Cloud customers need assurance

Full Text:

PDF

References


J.Dean and S.Ghemawat, “MapReduce:simplified data processing on large clusters”,communications of the ACM, January 2008/vol 51,No.1, Pages 107-113.

IDC Cloud Computing 2010 - An IDC Update, Frank Gens, Robert P Mahowald, Richard L Villars, Sep 2009 - Doc # TB20090929, 2009

General Services Administration US – GSA http://www.gsa.gov /Portal/gsa/ep /contentView.do

PCI Security Standards Council https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml

NIST http://csrc.nist.gov/groups/SNS /cloud-computing/index.html

Wikipedia http://en.wikipedia.org/ wiki/Cloud_computing

Craig Balding cloudsecurity.org. http://cloudsecurity.org/2008/07/21/assessing-the-security-benefits-of-cloud-computing

SUN - Project Kenai [Online] http://kenai.com/projects/suncloudapis/pages/HelloCloud

EC - European Commission [Online] http://ec.europa.eu/enterprise/policies/sme/small-business-act/index_en.htm

ISO/IEC. ISO/IEC 27001:2008 Information technology - Security Techniques - Information security risk management; Annex E: Information security risks assessment approaches, 2008

“Computing in Clouds” http://www.expresscomputeronline.com/20080218/technology01 .shtml

“SaaS / Cloud Computing” http://emergic.org/2008/09/08/saas-cloud-computing

“Guide to Cloud Computing” http://www.informationweek.com/news/services/hosted_apps/showArticle.jhtml?articleID=208700713

“Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data centers in the Cloud with SLAs” by Haley Beard.

“Cloud Security”http://cloudsecurity.org /2008/04/17/cloud-computing-defined-1


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.