By Topic
Skip to Results

Search Results

You searched for: cloud computing
19,319 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Security threats in cloud computing

    Shaikh, F.B. ; Haider, S.
    Internet Technology and Secured Transactions (ICITST), 2011 International Conference for

    Publication Year: 2011 , Page(s): 214 - 219
    Cited by:  Papers (6)

    IEEE Conference Publications

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of “cloud computing” also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud computing. The boom in cloud computing has brought lots of security challenges for the consumers and service providers. How the end users of cloud computing know that their information is not having any availability and security issues? Every one poses, Is their information secure? This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. Our work will enable researchers and security professionals to know about users and vendors concerns and critical analysis about the different security models and tools proposed. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Collaboration-Based Cloud Computing Security Management Framework

    Almorsy, M. ; Grundy, John ; Ibrahim, A.S.
    Cloud Computing (CLOUD), 2011 IEEE International Conference on

    DOI: 10.1109/CLOUD.2011.9
    Publication Year: 2011 , Page(s): 364 - 371
    Cited by:  Papers (7)

    IEEE Conference Publications

    Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in the Service Level Agreements between the cloud providers and consumers results in a loss of trust as well. Obtaining a security certificate such as ISO 27000 or NIST-FISMA would help cloud providers improve consumers trust in their cloud platforms' security. However, such standards are still far from covering the full complexity of the cloud computing model. We introduce a new cloud security management framework based on aligning the FISMA standard to fit with the cloud computing model, enabling cloud providers and consumers to be security certified. Our framework is based on improving collaboration between cloud providers, service providers and service consumers in managing the security of the cloud platform and the hosted services. It is built on top of a number of security standards that assist in automating the security management process. We have developed a proof of concept of our framework using. NET and deployed it on a test bed cloud platform. We evaluated the framework by managing the security of a multi-tenant SaaS application exemplar. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Realization of open cloud computing federation based on mobile agent

    Zehua Zhang ; Xuejie Zhang
    Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on

    Volume: 3
    DOI: 10.1109/ICICISYS.2009.5358085
    Publication Year: 2009 , Page(s): 642 - 646
    Cited by:  Papers (11)

    IEEE Conference Publications

    Although cloud computing is generally recognized as a technology which will has a significant impact on IT in the future. However, Cloud computing is still in its infancy, currently, there is not a standard available for it, portability and interoperability is also impossible between different Cloud Computing Service Providers, therefore, handicaps the widely deploy and quick development of cloud computing, there is still a long distance to the fine scenery which theoretically depicted by cloud computing. We analyze the problems in the current state of the art, put forward that Open Cloud Computing Federation is an inevitable approach for the widely use of cloud computing and to realize the greatest value of it. Accordingly, we proposal the MABOCCF (Mobile Agent Based Open Cloud Computing Federation) mechanism in this paper, it combines the advantages of Mobile Agent and cloud computing to provide a realization for the Open Cloud Computing Federation, MABOCCF can span over multiple heterogeneous Cloud Computing platforms and realizes portability and interoperability, it can be a beginning of open cloud computing federation and a future part of cloud computing. We also present in this paper the rationalities and the motivations for the combination of Mobile Agent and Cloud Computing, finally, a prototype is given with a performance analysis. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    QoS-Oriented Monitoring Model of Cloud Computing Resources Availability

    Wang En Dong ; Wu Nan ; Li Xu
    Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on

    DOI: 10.1109/ICCIS.2013.404
    Publication Year: 2013 , Page(s): 1537 - 1540

    IEEE Conference Publications

    With the development of cloud computing, many critical applications have been supported to provide many key services in the cloud computing. So the availability of cloud computing services turns to be higher and higher. Because resources of cloud computing are distributed, dynamic and heterogeneous, traditional research on availability cannot be good to adapt to the cloud computing new features. This paper does research on QoS-oriented cloud computing resources availability. First, a monitoring model of cloud computing resources availability is created. Then, according to the dynamic process of the cloud computing service, the availability of cloud computing resources is analyzed from QoS of a single cloud resource node which is described by common attribution and special attribution to QoS of some cloud resources which are connected by series model, parallel model and mix model to provide service. According to the three models and the analysis of the single cloud service resource, the availability of cloud computing service is monitored. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Toward cloud computing reference architecture: Cloud service management perspective

    Amanatullah, Y. ; Lim, C. ; Ipung, H.P. ; Juliandri, A.
    ICT for Smart Society (ICISS), 2013 International Conference on

    DOI: 10.1109/ICTSS.2013.6588059
    Publication Year: 2013 , Page(s): 1 - 4

    IEEE Conference Publications

    Cloud computing architecture is used as a guideline to understand the whole process including actor roles inside a cloud computing environment. Currently, there is only a few cloud computing architecture that can be used as a reference for building a cloud computing infrastructure. As cloud computing technology is being used to minimize the usage cost of computing resources, many enterprises gained interest of migrating their old system to the cloud computing system. This paper describes an overview of the new proposed cloud computing reference architecture but focusing on one of the cloud provider components which is cloud service management. It is required for cloud providers to support them managing their cloud services properly from the planning to delivery and operation process. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures

    Qiang Guan ; Chi-Chen Chiu ; Song Fu
    Dependable Computing (PRDC), 2012 IEEE 18th Pacific Rim International Symposium on

    DOI: 10.1109/PRDC.2012.10
    Publication Year: 2012 , Page(s): 11 - 20
    Cited by:  Papers (2)

    IEEE Conference Publications

    Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software failures. Dependability assurance is crucial for building sustainable cloud computing services. Although many techniques have been proposed to analyze and enhance reliability of distributed systems, there is little work on understanding the dependability of cloud computing environments. As virtualization has been an enabling technology for the cloud, it is imperative to investigate the impact of virtualization on the cloud dependability, which is the focus of this work. In this paper, we present a cloud dependability analysis (CDA) framework with mechanisms to characterize failure behavior in cloud computing infrastructures. We design the failure-metric DAGs (directed a cyclic graph) to analyze the correlation of various performance metrics with failure events in virtualized and non-virtualized systems. We study multiple types of failures. By comparing the generated DAGs in the two environments, we gain insight into the impact of virtualization on the cloud dependability. This paper is the first attempt to study this crucial issue. In addition, we exploit the identified metrics for failure detection. Experimental results from an on-campus cloud computing test bed show that our approach can achieve high detection accuracy while using a small number of performance metrics. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on cloud computing security problem and strategy

    Wentao Liu
    Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on

    DOI: 10.1109/CECNet.2012.6202020
    Publication Year: 2012 , Page(s): 1216 - 1219
    Cited by:  Papers (5)

    IEEE Conference Publications

    The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloud computing is very important and it can prevent the rapid development of cloud computing. This paper introduces some cloud computing systems and analyzes cloud computing security problem and its strategy according to the cloud computing concepts and characters. The data privacy and service availability in cloud computing are the key security problem. Single security method cannot solve the cloud computing security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud computing system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The issues of cloud computing security in high-speed railway

    Xiang Tan ; Bo Ai
    Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on

    Volume: 8
    DOI: 10.1109/EMEIT.2011.6023923
    Publication Year: 2011 , Page(s): 4358 - 4363
    Cited by:  Papers (4)

    IEEE Conference Publications

    Cloud computing has brought new changes and opportunities to IT industry. It is the result of the evolution of a variety of techniques. And the railway department will use the cloud computing technology to achieve the sharing of the railway information resources and to improve the capacity of information processing. But with the development of the cloud computing, it also faced with many difficulties, cloud computing security has become the leading cause of impeding its development. Cloud computing security has become a hot topic in industry and academic research. This paper will explore the status of the development of cloud computing security, analyze the data privacy, security auditing, data monitoring and other challenges that the cloud computing security faced with. We will describe the solutions which the industry and academia proposed for some key issues of cloud computing security, such as virtualization security and traffic monitoring between virtual machines and so on. And we analyzed the security of cloud computing in railway environment. We proposed a cloud computing security reference framework. The purpose of this paper is attempted to bring greater clarity landscape about cloud computing security. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud computing security threats and responses

    Sabahi, F.
    Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on

    DOI: 10.1109/ICCSN.2011.6014715
    Publication Year: 2011 , Page(s): 245 - 249
    Cited by:  Papers (19)

    IEEE Conference Publications

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. These types of concerns originate from the fact that data is stored remotely from the customer's location; in fact, it can be stored at any location. Security, in particular, is one of the most argued-about issues in the cloud computing field; several enterprises look at cloud computing warily due to projected security risks. The risks of compromised security and privacy may be lower overall, however, with cloud computing than they would be if the data were to be stored on individual machines instead of in a so - called "cloud" (the network of computers used for remote storage and maintenance). Comparison of the benefits and risks of cloud computing with those of the status quo are necessary for a full evaluation of the viability of cloud computing. Consequently, some issues arise that clients need to consider as they contemplate moving to cloud computing for their businesses. In this paper I summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research of cloud computing security in digital library

    Qingjie Meng ; Changqing Gong
    Information Management, Innovation Management and Industrial Engineering (ICIII), 2013 6th International Conference on

    Volume: 2
    DOI: 10.1109/ICIII.2013.6703173
    Publication Year: 2013 , Page(s): 41 - 44

    IEEE Conference Publications

    The cloud computing security in digital library was analyzed, for the digital books borrow, cloud storage and other related issues, a specific application of homomorphic encryption mechanism about library cloud computing was proposed. Firstly, the cloud computing mode of library digital resources is defined, a variety of collections databases and network resources adopt cloud computing mode to provide their service, these resources and service are placed in the cloud. And then the cloud key distribution scheme to adapt to library applications was presented, the improved traditional PKI, the PKI-based cloud computing communication and privacy protection mechanisms for library are introduced. The corresponding solution detail are proposed also: library cloud computing key distribution, authentication and encryption methods, more secure homomorphic encryption mechanism for library information retrieval. Preliminary analysis indicates that, these measures can protect the privacy and information security of library cloud computing. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud Computing learning

    Kalagiakos, P. ; Karampelas, P.
    Application of Information and Communication Technologies (AICT), 2011 5th International Conference on

    DOI: 10.1109/ICAICT.2011.6110925
    Publication Year: 2011 , Page(s): 1 - 4
    Cited by:  Papers (7)

    IEEE Conference Publications

    Cloud Computing is evolving as a key technology for sharing resources. Grid Computing, distributed computing, parallel computing and virtualization technologies define the shape of a new era. Traditional distance learning systems lack reusability, portability and interoperability. This paper sees cloud computing ecosystem as a new opportunity in designing cloud computing educational platforms where learning actors can reuse learning resources handled by cloud educational operating systems. To enhance learning objects portability and interoperability not only cloud computing API standards should be advocated by the key cloud providers but also learning resources standards should be defined by the Open Cloud Computing Education Federation as proposed by this paper. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cooperative cloud computing in research and academic environment using Virtual Cloud

    Malik, S. ; Huet, F. ; Caromel, D.
    Emerging Technologies (ICET), 2012 International Conference on

    DOI: 10.1109/ICET.2012.6375445
    Publication Year: 2012 , Page(s): 1 - 7
    Cited by:  Papers (1)

    IEEE Conference Publications

    Cloud computing is becoming as a main choice computing paradigm for the enterprises. Use of cloud computing technologies is increasing by every passing day. It has great advantages of on-demand computing, scalability, proactive resource management, better application throughput, and enhanced security. Due to its openness and adaptability, it can be a good option for voluntary resource computing among non-profit organizations. In this paper, we present a model for cooperative cloud computing among research institutes and universities using Virtual Cloud concepts. The propose model of Cooperative Cloud Computing encompasses the concepts of cloud federation and volunteer computing and is based on our Virtual Cloud architecture. The cooperative cloud computing can be performed at a global scale among universities and research centers (institutes) located in different continents. In this model, institutes get benefited with a much higher computing power available through cloud federation. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Property-Based Remote Attestation Oriented to Cloud Computing

    SiYuan Xin ; Yong Zhao ; Yu Li
    Computational Intelligence and Security (CIS), 2011 Seventh International Conference on

    DOI: 10.1109/CIS.2011.229
    Publication Year: 2011 , Page(s): 1028 - 1032
    Cited by:  Papers (1)

    IEEE Conference Publications

    As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user of the cloud may want to verify the trusted status of the platform which actually carries out the computing task in the cloud. And the remote attestation mechanism in Trusted Computing is suited for the cloud user's verification need. In this paper, the property-based remote attestation mechanism in Trusted Computing is imported into clouding computing, and a property-based remote attestation method oriented to cloud computing is designed based on the characteristics of cloud computing. In this method, through the attestation proxy, the remote attestation of the computing platform's security property is realized without disclosing the platform's configuration, and users can validate the security property of the actual computing platform in the virtual cloud computing environment. View full abstract»

  • Freely Available from IEEE

    CLOUD 2012: 2012 IEEE 5th International Conference on Cloud Computing [Cover art]


    Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on

    DOI: 10.1109/CLOUD.2012.151
    Publication Year: 2012 , Page(s): C4

    IEEE Conference Publications

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport

    Baliga, J. ; Ayre, R.W.A. ; Hinton, K. ; Tucker, RodneyS.
    Proceedings of the IEEE

    Volume: 99 , Issue: 1
    DOI: 10.1109/JPROC.2010.2060451
    Publication Year: 2011 , Page(s): 149 - 167
    Cited by:  Papers (85)

    IEEE Journals & Magazines

    Network-based cloud computing is rapidly expanding as an alternative to conventional office-based computing. As cloud computing becomes more widespread, the energy consumption of the network and computing resources that underpin the cloud will grow. This is happening at a time when there is increasing attention being paid to the need to manage energy consumption across the entire information and communications technology (ICT) sector. While data center energy use has received much attention recently, there has been less attention paid to the energy consumption of the transmission and switching networks that are key to connecting users to the cloud. In this paper, we present an analysis of energy consumption in cloud computing. The analysis considers both public and private clouds, and includes energy consumption in switching and transmission as well as data processing and data storage. We show that energy consumption in transport and switching can be a significant percentage of total energy consumption in cloud computing. Cloud computing can enable more energy-efficient use of computing power, especially when the computing tasks are of low intensity or infrequent. However, under some circumstances cloud computing can consume more energy than conventional computing where each user performs all computing on their own personal computer (PC). View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud Computing education strategies

    Breivold, H.P. ; Crnkovic, I.
    Software Engineering Education and Training (CSEE&T), 2014 IEEE 27th Conference on

    DOI: 10.1109/CSEET.2014.6816778
    Publication Year: 2014 , Page(s): 29 - 38

    IEEE Conference Publications

    Cloud Computing is changing the services consumption and delivery platform as well as the way businesses and users interact with IT resources. It represents a major conceptual shift that introduces new elements in programming models and development environments that are not present in traditional technologies. The evolution of Cloud Computing motivates teaching Cloud Computing to computer science senior students and graduate students so that they can gain broad exposure to the main body of knowledge of Cloud Computing and get prepared for occupations in industry. There is thus a strong need for having a Cloud Computing education course that (i) has a broad coverage of different roles interacting with a cloud; and (ii) leverages Cloud Computing concepts, technology and architecture topics at both introductory and advanced level. In this paper, we describe the demand for understanding the impact of Cloud Computing in computer science higher education. We propose education strategies for teaching Cloud Computing, including key knowledge areas for an enduring Cloud Computing course. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A New Technique of Data Integrity for Analysis of the Cloud Computing Security

    Chalse, R. ; Selokar, A. ; Katara, A.
    Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on

    DOI: 10.1109/CICN.2013.103
    Publication Year: 2013 , Page(s): 469 - 473

    IEEE Conference Publications

    Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    New Instructional Models for Building Effective Curricula on Cloud Computing Technologies and Engineering

    Demchenko, Y. ; Bernstein, D. ; Belloum, A. ; Oprescu, A. ; Wlodarczyk, T.W. ; de Laat, C.
    Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on

    Volume: 2
    DOI: 10.1109/CloudCom.2013.160
    Publication Year: 2013 , Page(s): 112 - 119

    IEEE Conference Publications

    This paper presents ongoing work to develop advanced education and training course on the Cloud Computing technologies foundation and engineering by a cooperating group of universities and the professional education partners. The central part of proposed approach is the Common Body of Knowledge in Cloud Computing (CBK-CC) that defines the professional level of knowledge in the selected domain and allows consistent curricula structuring and profiling. The paper presents the structure of the course and explains the principles used for developing course materials, such as Bloom's Taxonomy applied for technical education, and andragogy instructional model for professional education and training. The paper explains the importance of using the strong technical foundation to build the course materials that can address interests of different categories of stakeholders and roles/responsibilities in the Cloud Computing services provisioning and operation. The paper provides a short description of summary of the used Cloud Computing related architecture concepts and models that allow consistent mapping between CBK-CC, stakeholder roles/responsibilities and required skills, explaining also importance of the requirements engineering stage that provides a context for cloud based services design. The paper refers to the ongoing development of the educational course on Cloud Computing at the University of Amsterdam, University of Stavanger and provides suggestions for building advanced online training course for IT professionals. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Modeling and simulation of cloud computing: A review

    Wei Zhao ; Yong Peng ; Feng Xie ; Zhonghua Dai
    Cloud Computing Congress (APCloudCC), 2012 IEEE Asia Pacific

    DOI: 10.1109/APCloudCC.2012.6486505
    Publication Year: 2012 , Page(s): 20 - 24
    Cited by:  Papers (1)

    IEEE Conference Publications

    Cloud computing provides computing resources as a service over a network. As rapid application of this emerging technology in real world, it becomes more and more important how to evaluate the performance and security problems that cloud computing confronts. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. In this paper, to the best of our knowledge, we review the existing results on modeling and simulation of cloud computing. We start from reviewing the basic concepts of cloud computing and its security issues, and subsequently review the existing cloud computing simulators. Furthermore, we indicate that there exist two types of cloud computing simulators, that is, simulators just based on software and simulators based on both software and hardware. Finally, we analyze and compare features of the existing cloud computing simulators. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud computing - concepts, architecture and challenges

    Jadeja, Y. ; Modi, K.
    Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on

    DOI: 10.1109/ICCEET.2012.6203873
    Publication Year: 2012 , Page(s): 877 - 880
    Cited by:  Papers (16)

    IEEE Conference Publications

    With the advent internet in the 1990s to the present day facilities of ubiquitous computing, the internet has changed the computing world in a drastic way. It has traveled from the concept of parallel computing to distributed computing to grid computing and recently to cloud computing. Although the idea of cloud computing has been around for quite some time, it is an emerging field of computer science. Cloud computing can be defined as a computing environment where computing needs by one party can be outsourced to another party and when need be arise to use the computing power or resources like database or emails, they can access them via internet. Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. The main advantage of cloud computing is that customers do not have to pay for infrastructure, its installation, required man power to handle such infrastructure and maintenance. In this paper we will discuss what makes all this possible, what is the architectural design of cloud computing and its applications. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Impact of security risks on cloud computing adoption

    Kantarcioglu, M. ; Bensoussan, A. ; SingRu Hoe
    Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on

    DOI: 10.1109/Allerton.2011.6120232
    Publication Year: 2011 , Page(s): 670 - 674
    Cited by:  Papers (4)

    IEEE Conference Publications

    Cloud computing has been a paradigm shift in the information technology domain. It offers potential benefits to users in terms of instant availability, scalability and resource sharing, while potentially posing security issues. Especially, recent events like Amazons system failure increased the concerns related to cloud computing. Given these security and reliability concerns , we explore the optimal decision rule for moving certain IT function to public clouds. We formulate the problem as an entrepreneurial decision for an optimal stopping time at which the entrepreneur shall migrate to the cloud computing paradigm. Two different models are presented. Recognizing that an important and specific issue related to different computing paradigm is the potential "security" risk posed by each technology, we consider security risks in both models. The first model approaches the optimal adoption problem from assessing the cloud computing adoption under project value uncertainty. The entrepreneur has the timing flexibility and solves his optimal adoption decision under uncertainty. The optimal adoption rule obtained is a threshold strategy. A firm should adopt the cloud computing only if the value from the adoption exceeds the threshold level. The second model builds on a comprehensive assessment of two different computing paradigms. The entrepreneur can either keep the traditional on-site computing paradigm or migrate to the cloud computing paradigm. His problem is to make the paradigm shift optimally. We model such a problem as optimally swapping two "risky" assets, which refer to benefits of the traditional on-site computing paradigm and those of the cloud computing paradigm. The term "risky" captures the fact that actual benefits can only be resolved through time, and thus estimates of benefits are embedded with uncertainty. We obtain the optimal swapping rule as a threshold strategy, defined in terms of the two benefit ratio. A firm should only shift the part of its bus- ness to the cloud computing service if the ratio, the benefit from the cloud computing paradigm over that from the traditional on-site computing paradigm, exceeds the threshold. In both models, both the extent of riskiness (i.e. uncertainty) and the significance of security risks (both in terms of potential occurrence probability and the severity of damage) affect the threshold level, thus the entrepreneurial adoption decision. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on cloud computing data security model based on multi-dimension

    Zhang Xin ; Lai Song-qing ; Liu Nai-wen
    Information Technology in Medicine and Education (ITME), 2012 International Symposium on

    Volume: 2
    DOI: 10.1109/ITiME.2012.6291448
    Publication Year: 2012 , Page(s): 897 - 900
    Cited by:  Papers (1)

    IEEE Conference Publications

    Cloud computing is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud computing system. As a consequence, to build a cloud computing data security system is the basis to build cloud computing security system. In this article, the cloud computing technology architecture and the cloud computing data security features are the first to be studied and considered, then the cloud computing data security model is raised. At last, the realization of data security model has been researched. The model adopts a multi-dimension architecture of three - layers defense. First of all, user authentication is required to ensure that user data cannot be tampered. Users who pass the anthentication can get relative operation on the user data, such as addition, modification, deletion. If the unauthorized user use illegal means to deceive the authentication system, the file entered the system encrypt and privacy defense levels. In this layer, user data is encrypted. If key has been got by the intruder. The user data cannot be got valid information even it is obtained through function of privacy protection. It is very important for commercial users of the cloud computing to protect their business secrets. The last is the file quick regeneration layer, user data can get maximum regeneration even it is damaged through rapid regeneration algorithm in this layer. Each layer accomplishes its own job and combines with others to ensure data security in the cloud computing. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Agent-Based Cloud Computing

    Kwang Mong Sim
    Services Computing, IEEE Transactions on

    Volume: 5 , Issue: 4
    DOI: 10.1109/TSC.2011.52
    Publication Year: 2012 , Page(s): 564 - 577
    Cited by:  Papers (9)

    IEEE Journals & Magazines

    Multimedia

    Agent-based cloud computing is concerned with the design and development of software agents for bolstering cloud service discovery, service negotiation, and service composition. The significance of this work is introducing an agent-based paradigm for constructing software tools and testbeds for cloud resource management. The novel contributions of this work include: 1) developing Cloudle: an agent-based search engine for cloud service discovery, 2) showing that agent-based negotiation mechanisms can be effectively adopted for bolstering cloud service negotiation and cloud commerce, and 3) showing that agent-based cooperative problem-solving techniques can be effectively adopted for automating cloud service composition. Cloudle consists of 1) a service discovery agent that consults a cloud ontology for determining the similarities between providers' service specifications and consumers' service requirements, and 2) multiple cloud crawlers for building its database of services. Cloudle supports three types of reasoning: similarity reasoning, compatibility reasoning, and numerical reasoning. To support cloud commerce, this work devised a complex cloud negotiation mechanism that supports parallel negotiation activities in interrelated markets: a cloud service market between consumer agents and broker agents, and multiple cloud resource markets between broker agents and provider agents. Empirical results show that using the complex cloud negotiation mechanism, agents achieved high utilities and high success rates in negotiating for cloud resources. To automate cloud service composition, agents in this work adopt a focused selection contract net protocol (FSCNP) for dynamically selecting cloud services and use service capability tables (SCTs) to record the list of cloud agents and their services. Empirical results show that using FSCNP and SCTs, agents can successfully compose cloud services by autonomously selecting services. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Use of cryptography in cloud computing

    Jaber, A.N. ; Bin Zolkipli, M.F.
    Control System, Computing and Engineering (ICCSCE), 2013 IEEE International Conference on

    DOI: 10.1109/ICCSCE.2013.6719955
    Publication Year: 2013 , Page(s): 179 - 184

    IEEE Conference Publications

    Cloud computing is a platform for expanding capabilities and developing potentialities dynamically without employing new infrastructure, personnel, or software systems. In Addition, cloud computing originated from a commercial enterprise concept, and developed into a flourishing IT invention. However, given that considerable information on individuals and companies are identified in the cloud, concerns have been raised regarding the safety of the cloud environment. Despite the hype surrounding cloud computing, customers remain reluctant to deploy their commercial enterprise into the cloud. Nevertheless, lack of protection is the only major concern that hinders increased use of cloud computing. Furthermore, the complexity with which cloud computing manages data secrecy, and information security makes the market hesitant about cloud computing. The architecture of cloud models threatens the security of existing technologies when deployed in a cloud environment. Thus, users of cloud services should know the dangers of uploading data into this new environment. Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. This paper is a survey of specific security issues brought by the use of cryptography in a cloud computing system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Next generation of computing through cloud computing technology

    Mollah, M.B. ; Islam, K.R. ; Islam, S.S.
    Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on

    DOI: 10.1109/CCECE.2012.6334973
    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)

    IEEE Conference Publications

    Cloud computing, one of the emerging topic in the field of information technology, is the development of parallel computing, distributed computing and grid computing. By using the internet and central remote services it maintains the data, applications etc which offers much more efficient computing by centralizing storage, memory, processing, bandwidth and so on. It can also concentrate all computation resources and manage automatically through the software without intervene. There are several layers in present cloud computing architecture, service models, platforms, issues i.e. security, privacy, reliability, open standard etc. and types. This paper presents all about the promising cloud computing technology i.e. its architecture, advantages, platforms, issues and challenges, applications, future and research options of cloud computing. There four generations of computing such as mainframe based computing, personal computing, client server based computing and web server based computing respectively. As there are several advantages over present generation of web server based computing such as fast micro processor, huge memory, high-speed network, reliable system architecture etc. we can say that cloud computing will provide the next generation of computing services. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.