শনিবার, ৮ অক্টোবর, ২০১৬

References of the Project

References 

Cloud Computing Security. (2012).

Fazil Sabr, S. (2012). Cloud Computing Security. Saarbrücken: LAP LAMBERT Academic Publishing.

IEEE Cloud Computing Special Issue on Cloud Security. (2015). IEEE Cloud Computing, 2(5), c2-c2. http://dx.doi.org/10.1109/mcc.2015.88

Krutz, R. & Vines, R. (2010). Cloud security. Indianapolis, Ind.: Wiley Pub.

Pearson, S. & Yee, G. (2013). Privacy and security for cloud computing. London: Springer.

Rittinghouse, J. & Ransome, J. (2010). Cloud computing. Boca Raton: CRC Press.

Tajts, T. (2012). Cloud computing security. Lexington, KY: CreateSpace.

Williams, A. & Robinson, A. (2012). Public cloud computing. Hauppauge, N.Y.: Nova Science Publisher's.

Emerging Technologies and Innovation Project Closure

After three months long research and analysis on the emerging technologies and innovation we are finally come to the end of the project. This is our final blog where we discussed about the evaluation of the project. We have learned a lot from the project. 

Our evaluation of the project outcomes are as follows:
  • For this project, we selected Cloud Computing Security as a topic.
  • In the last three months, we have done lots of research on this topic, we showed cloud computing security is necessary for the modern cloud computing structure.
  • As per the requirement of the project, we have been updated this blog every week  and presented our regular analysis on cloud computing and the security issues.
  • Through the analysis we have been developed individual reports about cloud computing security very effectively.
  • Beside, we prepared our weekly progress report to show our regular working effort for the project.
  • In the last part of the project, we prepared a Ethical analysis on the present ICT controversies.
  • All of these researches and analysis help us to conclude the project successfully.
  • We have learned a lot about cloud computing security and presented some recommendations on the development of new security model for cloud computing. 
  • Our analysis can be helpful for ensuring effective security in the cloud computing.
  • We hope our efforts will be helpful to mitigate the ICT related controversies as well.
   Finally, we want to show our gratitude to our course co-coordinator, supervisor  and  the institution without their assistance we could not finish all of these  critical tasks successfully.Thanks to all to read our blog every week and inspire us to write more for you.

Thanks

রবিবার, ২৫ সেপ্টেম্বর, ২০১৬

Growth of Cloud Computing in 2016

Compare to the year 2010 to 2016 there have huge differences. In that diagram shows the development of cloud security and its revenue. The revenues grows rapidly and the figure almost  more than 25 billions of dollars in 2016 which is approximately 10 billion more than 2010 ("IEEE Cloud Computing Special Issue on Cloud Security", 2015). The most important cloud service name as IaaS, PaaS , SaaS and BPaaS also make huge development  in 2016.
Image result for cloud computing growth image

শনিবার, ২৪ সেপ্টেম্বর, ২০১৬

Solutions for Cloud Computing Security


We can take some steps to overcome those problems.

Some solutions are given below:

  • The cloud service providers security resources should be distributed to customers.
  • Most of the cloud servers and the account of users are being monitored and controlled by the service providers this should be changed.
  • The service must be provide legally and rules should be strict enough ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
  • The provider measures usage of CPU, memory, disk, network bandwidth, or other resources.
  • Data bypassing, unauthorized access, hacking etc. can be stopped with the help of effective firewall and server maintenance.





Researchers Overview on Cloud Computing Security

From our report we selected some important overviews on cloud computing which are given below:


Fazil Sabr said that , Cloud Computing initiatives could affect the enterprises within two to three years as it has the potential to significantly change IT.
 

Krutz & Vines said that, adopted cloud computing in a secure way and made full use of its opportunities.
 

Pearson & Yee said that, Cloud computing is still have excellent features and also have negative comments made on its possible implementation for a large-sized cloud solutions.
 

According to Tajts, cloud computing can represent an improvement is security for non-critical application and data.
 

According to Williams & Robinson, Cloud computing will be a major power of the large-scale and complex computing
 

"IEEE Cloud Computing Special Issue on Cloud Security", 2015- the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.

বুধবার, ১৪ সেপ্টেম্বর, ২০১৬

Challenges on Cloud Computing & Security Perspectives

Security: Well known security issues such as data loss, phishing and botnet create serious threats to an organization's data and software (Rittinghouse & Ransome, 2010).
 

Costing Model: Cloud consumers must consider the trade offs amongest computation, communication and integration. While migrating to the cloud can significantly reduce the infrastructure cost.
 

Charging Model: From a cloud provider's perspective the elastic resource pool has made the cost analysis a lot more complicated than regular data centers (Tajts, 2012).
 

Service level agreement: It is vital for consumers to obtain guarantees from providers on service delivery.

Issues in Cloud Computing Security

Important Issues of Cloud Computing Security
 

Privacy: Users may leak hidden information when they are accessed with cloud services and it helps to keep safe data from the attackers (Pearson & Yee, 2013).
 

Reliability: The cloud servers also experience slowdown as our local FTP server.
 

Compliance: The data centers maintained by cloud providers may also be subject to compliance requirements (Tajts, 2012).
 

Freedom: Cloud computing does not allow users to physically possess the storage of the data.