Open Access Open Access  Restricted Access Subscription or Fee Access

Ontology of Cloud Computing Service, Technology, and Security

G. Sathishkumar, B.R. Laxmi Sree

Abstract


In the electricity speed of the modern technological world, the cloud computing is necessary to save the cost for the economy of the society and save the valuable time and space at home and office. Cloud computing is an accumulation of the extant facility and technology, covered with in an advanced  framework paradigm that offers enhanced scalability, elasticity, business brisk, faster start up time, reduced management cost, and just-in-time availability of resources.  The cloud computing provide many number of services. The services are broadly classified as IAAS, PAAS, and SAAS. The main functionality and partial part of delivery service model to the user through the cloud computing is storing, accessing, retrieving, updating, and sharing the data flexible, scalable, and securable. This paper mainly concentrates on the security of the cloud data. It can share the data in the permanent cost of local resources and the changeable cost of cloud resources without loss or leakage of the data. In anywhere monitoring, maintaining, and managing our data requires confidentiality, integrity, and authenticity. So the cloud mostly uses the cryptographic technique to secure the data. (In the partial part of main functionality of cloud computing the cloud data sharing process part is major.)  In this case of sharing the data in the cloud transaction, the security is most important for the valuable personal information. 


Keywords


Scalability, Characteristics of Cloud, Authenticity, Phases of Data Lifecycle, Data Sharing in Cloud.

Full Text:

PDF

References


Cloud Computing Bible. Published By Wiley Publishing, Inc. Copyright © 2011 By Wiley Publishing, Inc., Indianapolis, Indiana. ISBN: 978-0-470-90356-8

IBM Private, Public, and Hybrid Cloud Storage Solutions, Second Edition (July 2014) Larry Coyne, Shivaramakrishnan, Gopalakrishnan, John Sing. © Copyright IBM Corp. 2012, 2014. All Rights Reserved.

Security Guidance For Critical Areas Of Focus In Cloud Computing V2.1 Prepared By The Cloud Security Alliance December 2009 Security Guidance For Critical Areas Of Focus In Cloud Computing V2.1, © 2009 Cloud Security Alliance.

Cloud Computing Principles and Paradigms. Edited By Rajkumar Buyya The University Of Melbourne And Manjrasoft Pty Ltd., Australia James Broberg The University Of Melbourne, Australia Andrzej Goscinski Deakin University, Australia. ISBN 978-0-470-88799-8

Http://Www.Tutorialspoint.Com/Cloud_Computing/Pdf/Cloud_Computing_Security.Pdf

“Privacy In Cloud Computing: A Survey” Dr. Arockiam L1, Parthasarathy G And Monikandan S 1Associate Professor,St.Joseph’s College,Trichy, Tamilnadu, India Larockiam@Yahoo.Co.In 2Assistant Professor, TRP Engineering College, Trichy, Tamilnadu, India

Parthasarathee.G@Gmail.Com Research Scholar, Manonmaniam sundaranar University, Tirunelveli, India Moni.Tamil@Gmail.Com

Technet Magazine “Cloud Security: Safely Sharing IT Solutions” (Http://Technet.Microsoft.Com/En-Us/Magazine/Gg296364.Aspx)

ITL Bulletin For June 2012 “Cloud Computing: A Review Of Features, Benefits, And Risks, And Recommendations For Secure, Efficient Implementations” Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute Of Standards And Technology.

Article 4: Hassan Takabi and James B.D Joshi, Gail-Joon Ahn “Security and Privacy Challenges in Cloud Computing Environments”

Parallel and Distributed Systems, IEEE Transactions on (Volume:22 , Issue: 6 ) “Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing”

“Cloud Storage Architecture” 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA)

[IT@Intel White Paper Intel IT, IT Best Practices Cloud Computing and IT Efficiency July 2011, “Implementing Cloud Storage Metrics to Improve IT Efficiency and Capacity Management”.

“Security Guidance for Critical Areas of Focus in Cloud Computing” V2.1 Prepared by the Cloud Security Alliance December 2009.

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 “A Security Framework in Cloud Computing Infrastructure” Arijit Ukil, Debasish Jana and Ajanta De Sarkar.

Journal of China Universities of Posts and Telecommunications October 2012, 19(Suppl. 2): 182–189 “Secure cloud storage based on cryptographic techniques” PENG Yong, ZHAO Wei, XIE Feng, DAI Zhong-hua, GAO Yang, CHEN Dong-qing.

The Publishing House Of The Romanian Academy Volume 14, Number 1/2013, pp. 72–77 “New Cryptographic Challenges In Cloud Computing Era” .

“Cryptography Challenges for Computational Privacy in Public Clouds” Sashank Dara International Institute of Information Technology, Bangalore.

“VSRD international journal of Computer science & information Technology. VSRD-IJCSIT, Vol. 2 (3), 2012, 242-249 “Cryptography and Encryption In Cloud Computing”

Simarjeet Kaur. International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium, “Security Architecture for Cloud Networking”.

“The Benefits of Cloud Networking” Enable cloud networking to lower IT costs & boost IT productivity. white paper.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.