শনিবার, ৮ অক্টোবর, ২০১৬

References of the Project

References 

Cloud Computing Security. (2012).

Fazil Sabr, S. (2012). Cloud Computing Security. Saarbrücken: LAP LAMBERT Academic Publishing.

IEEE Cloud Computing Special Issue on Cloud Security. (2015). IEEE Cloud Computing, 2(5), c2-c2. http://dx.doi.org/10.1109/mcc.2015.88

Krutz, R. & Vines, R. (2010). Cloud security. Indianapolis, Ind.: Wiley Pub.

Pearson, S. & Yee, G. (2013). Privacy and security for cloud computing. London: Springer.

Rittinghouse, J. & Ransome, J. (2010). Cloud computing. Boca Raton: CRC Press.

Tajts, T. (2012). Cloud computing security. Lexington, KY: CreateSpace.

Williams, A. & Robinson, A. (2012). Public cloud computing. Hauppauge, N.Y.: Nova Science Publisher's.

Emerging Technologies and Innovation Project Closure

After three months long research and analysis on the emerging technologies and innovation we are finally come to the end of the project. This is our final blog where we discussed about the evaluation of the project. We have learned a lot from the project. 

Our evaluation of the project outcomes are as follows:
  • For this project, we selected Cloud Computing Security as a topic.
  • In the last three months, we have done lots of research on this topic, we showed cloud computing security is necessary for the modern cloud computing structure.
  • As per the requirement of the project, we have been updated this blog every week  and presented our regular analysis on cloud computing and the security issues.
  • Through the analysis we have been developed individual reports about cloud computing security very effectively.
  • Beside, we prepared our weekly progress report to show our regular working effort for the project.
  • In the last part of the project, we prepared a Ethical analysis on the present ICT controversies.
  • All of these researches and analysis help us to conclude the project successfully.
  • We have learned a lot about cloud computing security and presented some recommendations on the development of new security model for cloud computing. 
  • Our analysis can be helpful for ensuring effective security in the cloud computing.
  • We hope our efforts will be helpful to mitigate the ICT related controversies as well.
   Finally, we want to show our gratitude to our course co-coordinator, supervisor  and  the institution without their assistance we could not finish all of these  critical tasks successfully.Thanks to all to read our blog every week and inspire us to write more for you.

Thanks

রবিবার, ২৫ সেপ্টেম্বর, ২০১৬

Growth of Cloud Computing in 2016

Compare to the year 2010 to 2016 there have huge differences. In that diagram shows the development of cloud security and its revenue. The revenues grows rapidly and the figure almost  more than 25 billions of dollars in 2016 which is approximately 10 billion more than 2010 ("IEEE Cloud Computing Special Issue on Cloud Security", 2015). The most important cloud service name as IaaS, PaaS , SaaS and BPaaS also make huge development  in 2016.
Image result for cloud computing growth image

শনিবার, ২৪ সেপ্টেম্বর, ২০১৬

Solutions for Cloud Computing Security


We can take some steps to overcome those problems.

Some solutions are given below:

  • The cloud service providers security resources should be distributed to customers.
  • Most of the cloud servers and the account of users are being monitored and controlled by the service providers this should be changed.
  • The service must be provide legally and rules should be strict enough ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
  • The provider measures usage of CPU, memory, disk, network bandwidth, or other resources.
  • Data bypassing, unauthorized access, hacking etc. can be stopped with the help of effective firewall and server maintenance.





Researchers Overview on Cloud Computing Security

From our report we selected some important overviews on cloud computing which are given below:


Fazil Sabr said that , Cloud Computing initiatives could affect the enterprises within two to three years as it has the potential to significantly change IT.
 

Krutz & Vines said that, adopted cloud computing in a secure way and made full use of its opportunities.
 

Pearson & Yee said that, Cloud computing is still have excellent features and also have negative comments made on its possible implementation for a large-sized cloud solutions.
 

According to Tajts, cloud computing can represent an improvement is security for non-critical application and data.
 

According to Williams & Robinson, Cloud computing will be a major power of the large-scale and complex computing
 

"IEEE Cloud Computing Special Issue on Cloud Security", 2015- the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.

বুধবার, ১৪ সেপ্টেম্বর, ২০১৬

Challenges on Cloud Computing & Security Perspectives

Security: Well known security issues such as data loss, phishing and botnet create serious threats to an organization's data and software (Rittinghouse & Ransome, 2010).
 

Costing Model: Cloud consumers must consider the trade offs amongest computation, communication and integration. While migrating to the cloud can significantly reduce the infrastructure cost.
 

Charging Model: From a cloud provider's perspective the elastic resource pool has made the cost analysis a lot more complicated than regular data centers (Tajts, 2012).
 

Service level agreement: It is vital for consumers to obtain guarantees from providers on service delivery.

Issues in Cloud Computing Security

Important Issues of Cloud Computing Security
 

Privacy: Users may leak hidden information when they are accessed with cloud services and it helps to keep safe data from the attackers (Pearson & Yee, 2013).
 

Reliability: The cloud servers also experience slowdown as our local FTP server.
 

Compliance: The data centers maintained by cloud providers may also be subject to compliance requirements (Tajts, 2012).
 

Freedom: Cloud computing does not allow users to physically possess the storage of the data.

Cloud Computing Service

Three types of services that cloud computing provides are :

  • Software as a service(SaaS)
  • Platform as a service(PaaS)
  • Infrastructure as a service(IaaS)
http://thecloudplus.com/images/cloudcomputing.png

SaaS: Cloud consumers release their application in a hosting enviroment, which can be accessed through networks from various clients by application user. Cloud consumers do not have control over cloud infrastructure.Example: Sales Force.com, Google Mail, Google Docs (Krutz & Vines, 2010).

PaaS: PaaS is a development platform supporting the full software lifetime which allows cloud consumers to develop cloud service and applications directly on the PaaS cloud.Example: Google App Engine (Fazil Sabr, 2012).

IaaS: Cloud consumers directly use IT infrastructures provided by IaaS cloud. Example: Amazon's EC2 ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).

শনিবার, ১০ সেপ্টেম্বর, ২০১৬

Cloud Computing and Save Money in BUSINESS

Some ways that can help us to save money in business by cloud computing are:




Reduction of Meeting: To replace or shorten some meetings and distribute information through cloud service.
 

The Cost of Filling: Keep documents organized for more efficient documents.
 

Too Much Paper: Convert to online documents for billing,invoices,expenses reporting and memos.
 

Expense Report Inaccuracies: Use an automated export report system that lets us snap photos of receipts for automatic storage and data organization (Cloud Computing Security, 2012).
 

Disorganization in the Office: Keep documents organized online which can which help to find information in seconds.


Cloud Computing Security Development and Testing

Some important cloud development issues that we can follow and take necessary steps which are;
  • Choosing from the major Platform as a Service providers .
  • Microsoft Azure actually works better than other platform.
  • Cloud computing programming learn from API tutorial.
  • Microsoft Azure tutorial can be helpful (Fazil Sabr, 2012).
  • Develop cloud security structure through various methods
  • An introduction of Microsoft Azure in development process.
  • Compatibility concerns in the evolution of cloud computing APIs.

The Gradual development of Cloud Computing Security through Testing from 2000 to 2012 (Fazil Sabr, 2012):
 

Cost & Effective Managment Process of Cloud Computing

Proper utilization of some important factors can reduce the costs for cloud computing:

 http://cloudtimes.org/wp-content/uploads/2011/10/Cloud-Cost-Management-Diagram1.jpg

  1. Moving and storing: To move large numbers of data to public cloud service and to store that data for long period of time, we need to invest thousand of dollar (Rittinghouse & Ransome, 2010).
  2. Testing software: Before migrating to the cloud , we need to test the software which make huge cost also (Pearson & Yee, 2013).
  3. Rent and Utilities: Excessive rent and make a huge budget for utility expenses sometimes create unexpected cost.


  

রবিবার, ৪ সেপ্টেম্বর, ২০১৬

Cloud Computing Security Plan



The most important  PLAN that we can selected for our companies which are given below :


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwbGN3C6s1pIKtieaTybZV2uTsElIIa58wDUmyFnErQqDIqIY0ysa2ulBPMI-kGqjcq5spcXY1ZvbjI6XJRD6AwZgU2R6fi-BJnZoaogG0ZhRSh5CbDn7mmlL398Lf7-3EwodmyUjkHg0a/s1600/STORM.png


  1. Organization's must appoint risk management specialist for the planning whom can ensure business goal , how to process new technology and engage new people ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
  2. The cost of security is a another important issue as a measurement of cost we can able to reduce cost, helps to track time and prepared to spent actual amount what we needed in IT sector.
  3. If our current capability is poor we should give priority to improving identity management.
  4. Try to create general awareness  by educating and warning staff members about specific dangers (Pearson & Yee, 2013).
  5. Use external IT security consultants to check your company’s security policy and network.
  6. Determine specific IT security policies.
  7. Review backup and disaster-recovery systems.


Different Security Threats of Cloud Computing



1. Loss or theft of intellectual property: Companies store sensitive data in the cloud. So cyber criminals try to breach the security of the system.

2. Compliance violations and regulatory actions: Most companies operates some sort of regulatory control of their information . Under these regulations, companies must know where their data is, who is able to access it, and how it is being protected.

3.Loss of control over end user actions: Its important to careful about employees and never give them all freedom that he/she could download all customer contracts because they can access that information once they are employed by competitors .

4. Malware infections that unleash a targeted attack. Cyber criminals used file sharing services to deliver the malware to the cloud server.

Cloud Computing benifits and its purposes


1. Flexibility: In worldwide demand, cloud computing services are ideal for growing business. The level of flexibility can give businesses using cloud computing with real advantage competing others as well.

2. Disaster recovery: All sizes of business investing huge amount of money to recover disaster. However, sometimes it is not affordable for small sizes business to invest more. Moreover cloud computing helps to avoid more investment, save time and roll up with third-party expertise
(Tajts, 2012).

3. Automatic software updates: It helps to make software update regularly. As a result it saves our time and maintain system.

4. Capital-expenditure: Cloud computing helps to cut out the extra expenditure.

5. Increased collaboration: By that software we can easily transfer any document to others anytime, anywhere in a quick time and help to make updates in real time
(Tajts, 2012).

6. Work from anywhere: It gives us opportunity to work from anywhere when we are in vacation time also. It spread the work facility in all over the world .

7. Document control: Biggest advantage of cloud computing is to control document by their own employees and it will be safe for lifetime
(Williams & Robinson, 2012).

8. Security: Cloud computing make the security strong; third parties can not break down the security at any of cost.













রবিবার, ২৮ আগস্ট, ২০১৬

Cloud Computing Security Risks and Concers

By that research we found 10 major problems:

Those major drawbacks of cloud computing are given below :


  • Critical business data at risk
  • Tied into the cloud
  • IT skill shortage could get worse
  • Reliance on third parties to run our IT
  • the clandestine surveillance of data traffic on the Internet
  • Little room for negotiation on contracts
  • Cloud vendor outages leave you high and dry
  • Lack of internet access leaves data out of reach
  • Cost-saving benefits disappear as demand grows
  • Automatic updates enforce change
Another most concerning problem is information leakage. The graph given below shows us why it has caused so much concerns (Krutz & Vines, 2010):


বুধবার, ২৪ আগস্ট, ২০১৬

Cloud Formation


Cloud formations can be divided into public, private,community and hybrid clouds.



  1. Public Clouds: Public clouds which is available to the public at  the large number.
 2.Private Clouds: That cloud used by  one customer where privacy and data  security is usually the primary concern. Consumer will have to bear significant cost of setting up and for maintenance cost as well ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
  

3. Hybrid Clouds : A hybrid cloud involved with composition of two or more clouds which utilizing both public  and private cloud.

4.Community Cloud: Community cloud service provides a solution of limited number of
        individuals and organizations with similar IT sharing and provided                                           by a single supplier ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).

সোমবার, ২২ আগস্ট, ২০১৬

Cloud Computing and its characteristics

Cloud Computing is a paradigm shift that provides computing over the internet. A Cloud Computing service consists of highly optimized virtual data center that provides various software, hardware and information resources for use when needed organization can simply connect to the the cloud and use the available resources on a pay-per-use basis which helps companies avoid capital expenditure on additional premises infrastructure resources and instantly scale up or scale down according to business requirements (Fazil Sabr, 2012).

Five essential characteristics :
                                                                       


 
  • On demand self-service 
  • Broad network access 
  • Resource pooling 
  • Rapid elasticity 
  • Measured service

সোমবার, ১৫ আগস্ট, ২০১৬

Capstone Project on Cloud Computing Security

Hello Everyone,

We're the students of  Charles Sturt University, Melbourne, Australia. We're now doing a project on Cloud Computing Security. We have formed a group to complete all the research and analysis successfully. Our group member names are as follows: 
  • Yarlagadda Abhilash Babu     ID. 11596305
  • Ponnanganti Suresh                 ID. 11584127
  • Veeranjaneyulu  Pinninti        ID.  11588155
We're now writing a Project Proposal & Plan for this Capstone Project on Cloud Computing Security. The topic has been selected due to the importance and implementation of cloud computing in the modern era. Now a days, most of the financial and non-financial organizations are try to maintain a cloud networking option to smoothly transfer and retrieve data and information of the business at any time. At present, there are lots of security issues are seen in cloud computing that create problem in the development of this innovative technology. Hacking, bypassing etc. are identified as major security issues  of this technology. So researches are necessary to identify the problem and find a solution  to get rid of this issue.

For all of these reasons, we have selected this topic. We will try our level best to research on the basic cloud computing, security issues, models, advantages, setbacks, and characteristics of the technology. Finally, we will try to present an effective solution based on the overall analysis. The project will be completed in October, 2016. And the overall project will be going on under the supervision of our honorable supervisor. I hope our project will be helpful for
the future development of  Cloud Computing Security.




 Thanks