রবিবার, ২৮ আগস্ট, ২০১৬

Cloud Computing Security Risks and Concers

By that research we found 10 major problems:

Those major drawbacks of cloud computing are given below :


  • Critical business data at risk
  • Tied into the cloud
  • IT skill shortage could get worse
  • Reliance on third parties to run our IT
  • the clandestine surveillance of data traffic on the Internet
  • Little room for negotiation on contracts
  • Cloud vendor outages leave you high and dry
  • Lack of internet access leaves data out of reach
  • Cost-saving benefits disappear as demand grows
  • Automatic updates enforce change
Another most concerning problem is information leakage. The graph given below shows us why it has caused so much concerns (Krutz & Vines, 2010):


বুধবার, ২৪ আগস্ট, ২০১৬

Cloud Formation


Cloud formations can be divided into public, private,community and hybrid clouds.



  1. Public Clouds: Public clouds which is available to the public at  the large number.
 2.Private Clouds: That cloud used by  one customer where privacy and data  security is usually the primary concern. Consumer will have to bear significant cost of setting up and for maintenance cost as well ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
  

3. Hybrid Clouds : A hybrid cloud involved with composition of two or more clouds which utilizing both public  and private cloud.

4.Community Cloud: Community cloud service provides a solution of limited number of
        individuals and organizations with similar IT sharing and provided                                           by a single supplier ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).

সোমবার, ২২ আগস্ট, ২০১৬

Cloud Computing and its characteristics

Cloud Computing is a paradigm shift that provides computing over the internet. A Cloud Computing service consists of highly optimized virtual data center that provides various software, hardware and information resources for use when needed organization can simply connect to the the cloud and use the available resources on a pay-per-use basis which helps companies avoid capital expenditure on additional premises infrastructure resources and instantly scale up or scale down according to business requirements (Fazil Sabr, 2012).

Five essential characteristics :
                                                                       


 
  • On demand self-service 
  • Broad network access 
  • Resource pooling 
  • Rapid elasticity 
  • Measured service

সোমবার, ১৫ আগস্ট, ২০১৬

Capstone Project on Cloud Computing Security

Hello Everyone,

We're the students of  Charles Sturt University, Melbourne, Australia. We're now doing a project on Cloud Computing Security. We have formed a group to complete all the research and analysis successfully. Our group member names are as follows: 
  • Yarlagadda Abhilash Babu     ID. 11596305
  • Ponnanganti Suresh                 ID. 11584127
  • Veeranjaneyulu  Pinninti        ID.  11588155
We're now writing a Project Proposal & Plan for this Capstone Project on Cloud Computing Security. The topic has been selected due to the importance and implementation of cloud computing in the modern era. Now a days, most of the financial and non-financial organizations are try to maintain a cloud networking option to smoothly transfer and retrieve data and information of the business at any time. At present, there are lots of security issues are seen in cloud computing that create problem in the development of this innovative technology. Hacking, bypassing etc. are identified as major security issues  of this technology. So researches are necessary to identify the problem and find a solution  to get rid of this issue.

For all of these reasons, we have selected this topic. We will try our level best to research on the basic cloud computing, security issues, models, advantages, setbacks, and characteristics of the technology. Finally, we will try to present an effective solution based on the overall analysis. The project will be completed in October, 2016. And the overall project will be going on under the supervision of our honorable supervisor. I hope our project will be helpful for
the future development of  Cloud Computing Security.




 Thanks