of
A Survey on Security Cloud Computing
"According to Google's Kevin Marks, the term "cloud computing" comes "from [the] early days in the internet where we drew the network as a cloud." Cloud computing is a efficient and convenient, on-demand shared pool of configurable computing resources and devices. Cloud systems require a simple installation and are user friendly.
Cloud computing is classified based on service models or deployment.
- "A Private vloud is owned or rented by an organization. The whole cloud resource is dedicated to that organization for its private use. An example of this model is a cloud built by an enterprise to serve their business critical applications.
- A Public cloud is owned by a service provider and its resources are sold to the public. End-users can rent parts of the resources and can typically scale their resource consumption up (or down) to their requirements. Amazon, Google, Rack-space, Salesforce, and Microsoft are examples or public cloud providers.
- A Community cloud is similar to a private cloud but where the cloud resource is shared among members of a closed community with similar interest.
- A Hybrid cloud is a combination of two or more cloud infrastructures: this can be either private, public, or community clouds. The main purpose of a hybrid cloud is usually to provide extra resource in cases of high demand, for instance enabling migration some computation task from a private cloud to a public cloud.?
Traditional Security Challenges
Cloud computing is vulnerable to new attack vectors that are simple to carry out. There is also the risk of forensics becoming more difficult, police investigators may lack inability to access hardware physically. "The availability of cloud service providers is also a big concern, since if the cloud service is dis-rupted, it affects more customers than in the traditional model. For example, the recent disruption of the Amazon cloudservice took down a number of websites including Reddit, Foursquare, and Quora."
Cloud Security Challenges
"As end-users utilize the cloud services and store their data in the provider’s infrastructure, the most critical security con-cern is about privacy and user data confidentiality. End-users want to know where their information is stored, and who is incontrol of that information in addition to the owners. They also want to be guaranteed that the critical information is notaccessed and used illegally, even by the cloud providers."
Source: www.elsevier.com/locate/compeleceng