Compare to the year 2010 to 2016 there have
huge differences. In that diagram shows the development of cloud security and
its revenue. The revenues grows rapidly and the figure almost more than 25 billions of
dollars in 2016 which is approximately 10 billion more than 2010 ("IEEE Cloud Computing Special Issue on Cloud Security", 2015). The most
important cloud service name as IaaS, PaaS , SaaS and BPaaS also make huge
development in 2016.
রবিবার, ২৫ সেপ্টেম্বর, ২০১৬
শনিবার, ২৪ সেপ্টেম্বর, ২০১৬
Solutions for Cloud Computing Security
We can take some steps to overcome those problems.
Some solutions are given below:
- The cloud service providers security resources should be distributed to customers.
- Most of the cloud servers and the account of users are being monitored and controlled by the service providers this should be changed.
- The service must be provide legally and rules should be strict enough ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
- The provider measures usage of CPU, memory, disk, network bandwidth, or other resources.
- Data bypassing, unauthorized access, hacking etc. can be stopped with the help of effective firewall and server maintenance.
Researchers Overview on Cloud Computing Security
From our report we selected some important overviews on cloud computing which are given below:
Fazil Sabr said that , Cloud Computing initiatives could affect the enterprises within two to three years as it has the potential to significantly change IT.
Krutz & Vines said that, adopted cloud computing in a secure way and made full use of its opportunities.
Pearson & Yee said that, Cloud computing is still have excellent features and also have negative comments made on its possible implementation for a large-sized cloud solutions.
According to Tajts, cloud computing can represent an improvement is security for non-critical application and data.
According to Williams & Robinson, Cloud computing will be a major power of the large-scale and complex computing
"IEEE Cloud Computing Special Issue on Cloud Security", 2015- the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.
বুধবার, ১৪ সেপ্টেম্বর, ২০১৬
Challenges on Cloud Computing & Security Perspectives
Security: Well known security issues such as data loss, phishing and botnet create serious threats to an organization's data and software (Rittinghouse & Ransome, 2010).
Costing Model: Cloud consumers must consider the trade offs amongest computation, communication and integration. While migrating to the cloud can significantly reduce the infrastructure cost.
Charging Model: From a cloud provider's perspective the elastic resource pool has made the cost analysis a lot more complicated than regular data centers (Tajts, 2012).
Service level agreement: It is vital for consumers to obtain guarantees from providers on service delivery.
Issues in Cloud Computing Security
Important Issues of Cloud Computing Security
Privacy: Users may leak hidden information when they are accessed with cloud services and it helps to keep safe data from the attackers (Pearson & Yee, 2013).
Reliability: The cloud servers also experience slowdown as our local FTP server.
Compliance: The data centers maintained by cloud providers may also be subject to compliance requirements (Tajts, 2012).
Freedom: Cloud computing does not allow users to physically possess the storage of the data.
Privacy: Users may leak hidden information when they are accessed with cloud services and it helps to keep safe data from the attackers (Pearson & Yee, 2013).
Reliability: The cloud servers also experience slowdown as our local FTP server.
Compliance: The data centers maintained by cloud providers may also be subject to compliance requirements (Tajts, 2012).
Freedom: Cloud computing does not allow users to physically possess the storage of the data.
Cloud Computing Service
Three types of services that cloud computing provides are :
- Software as a service(SaaS)
- Platform as a service(PaaS)
- Infrastructure as a service(IaaS)
SaaS: Cloud consumers release their application in a hosting enviroment, which can be accessed through networks from various clients by application user. Cloud consumers do not have control over cloud infrastructure.Example: Sales Force.com, Google Mail, Google Docs (Krutz & Vines, 2010).
PaaS: PaaS is a development platform supporting the full software lifetime which allows cloud consumers to develop cloud service and applications directly on the PaaS cloud.Example: Google App Engine (Fazil Sabr, 2012).
IaaS: Cloud consumers directly use IT infrastructures provided by IaaS cloud. Example: Amazon's EC2 ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
শনিবার, ১০ সেপ্টেম্বর, ২০১৬
Cloud Computing and Save Money in BUSINESS
Some ways that can help us to save money in business by cloud computing are:
Reduction of Meeting: To replace or shorten some meetings and distribute information through cloud service.
The Cost of Filling: Keep documents organized for more efficient documents.
Too Much Paper: Convert to online documents for billing,invoices,expenses reporting and memos.
Expense Report Inaccuracies: Use an automated export report system that lets us snap photos of receipts for automatic storage and data organization (Cloud Computing Security, 2012).
Disorganization in the Office: Keep documents organized online which can which help to find information in seconds.
Reduction of Meeting: To replace or shorten some meetings and distribute information through cloud service.
The Cost of Filling: Keep documents organized for more efficient documents.
Too Much Paper: Convert to online documents for billing,invoices,expenses reporting and memos.
Expense Report Inaccuracies: Use an automated export report system that lets us snap photos of receipts for automatic storage and data organization (Cloud Computing Security, 2012).
Disorganization in the Office: Keep documents organized online which can which help to find information in seconds.
Cloud Computing Security Development and Testing
Some important cloud development issues that we can follow and take necessary steps which are;
The Gradual development of Cloud Computing Security through Testing from 2000 to 2012 (Fazil Sabr, 2012):
- Choosing from the major Platform as a Service providers .
- Microsoft Azure actually works better than other platform.
- Cloud computing programming learn from API tutorial.
- Microsoft Azure tutorial can be helpful (Fazil Sabr, 2012).
- Develop cloud security structure through various methods
- An introduction of Microsoft Azure in development process.
- Compatibility concerns in the evolution of cloud computing APIs.
The Gradual development of Cloud Computing Security through Testing from 2000 to 2012 (Fazil Sabr, 2012):
Cost & Effective Managment Process of Cloud Computing
Proper utilization of some important factors can reduce the costs for cloud computing:
- Moving and storing: To move large numbers of data to public cloud service and to store that data for long period of time, we need to invest thousand of dollar (Rittinghouse & Ransome, 2010).
- Testing software: Before migrating to the cloud , we need to test the software which make huge cost also (Pearson & Yee, 2013).
- Rent and Utilities: Excessive rent and make a huge budget for utility expenses sometimes create unexpected cost.
রবিবার, ৪ সেপ্টেম্বর, ২০১৬
Cloud Computing Security Plan
The most important PLAN that we can selected for our companies which are given below :
- Organization's must appoint risk management specialist for the planning whom can ensure business goal , how to process new technology and engage new people ("IEEE Cloud Computing Special Issue on Cloud Security", 2015).
- The cost of security is a another important issue as a measurement of cost we can able to reduce cost, helps to track time and prepared to spent actual amount what we needed in IT sector.
- If our current capability is poor we should give priority to improving identity management.
- Try to create general awareness by educating and warning staff members about specific dangers (Pearson & Yee, 2013).
- Use external IT security consultants to check your company’s security policy and network.
- Determine specific IT security policies.
- Review backup and disaster-recovery systems.
Different Security Threats of Cloud Computing
1. Loss or theft of intellectual property: Companies store sensitive data in the cloud. So cyber criminals try to breach the security of the system.
2. Compliance violations and regulatory actions: Most companies operates some sort of regulatory control of their information . Under these regulations, companies must know where their data is, who is able to access it, and how it is being protected.
3.Loss of control over end user actions: Its important to careful about employees and never give them all freedom that he/she could download all customer contracts because they can access that information once they are employed by competitors .
4. Malware infections that unleash a targeted attack. Cyber criminals used file sharing services to deliver the malware to the cloud server.
Cloud Computing benifits and its purposes
1. Flexibility: In worldwide demand, cloud computing services are ideal for growing business. The level of flexibility can give businesses using cloud computing with real advantage competing others as well.
2. Disaster recovery: All sizes of business investing huge amount of money to recover disaster. However, sometimes it is not affordable for small sizes business to invest more. Moreover cloud computing helps to avoid more investment, save time and roll up with third-party expertise (Tajts, 2012).
3. Automatic software updates: It helps to make software update regularly. As a result it saves our time and maintain system.
4. Capital-expenditure: Cloud computing helps to cut out the extra expenditure.
5. Increased collaboration: By that software we can easily transfer any document to others anytime, anywhere in a quick time and help to make updates in real time (Tajts, 2012).
6. Work from anywhere: It gives us opportunity to work from anywhere when we are in vacation time also. It spread the work facility in all over the world .
7. Document control: Biggest advantage of cloud computing is to control document by their own employees and it will be safe for lifetime (Williams & Robinson, 2012).
8. Security: Cloud computing make the security strong; third parties can not break down the security at any of cost.
এতে সদস্যতা:
পোস্টগুলি (Atom)