Cloud Computing - Overview of Information Assurance Concerns and Opportunities

ثبت نشده
چکیده

Cloud computing is an emerging trend which has progressed to the point of serious adoption in both public and private sector organizations, yet it remains a relatively immature paradigm, one which dictates a revision to the traditional characterization of risk in information technology environments. As a means of an introduction to those changes, this paper offers an overview of the information assurance aspects of cloud computing with a focus on potential security advantages and pitfalls. While many of the security concerns associated with cloud computing are shared with traditional computing models, this paper will focus on those issues unique to cloud computing or that are exacerbated by it. The intended audience is anyone who is considering the adoption of cloud computing and who needs to understand the security risks and potential opportunities cloud computing provides as part of a risk management process. Cloud computing is an evolving concept and various definitions have been offered, some with widely varying scope. However, boiled down to the basic concepts and simply stated, cloud computing can be described as a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the network. 1 Examples of cloud computing delivery models vary from infrastructure as a service (IaaS) where one can lease capabilities such as storage or computing resources (e.g., Amazon Simple Storage Service and Elastic Compute Cloud), platform as a service (PaaS) where one can lease an application development environment (e.g., The Microsoft Azure Services Platform) and software as a service (SaaS) which offers network based applications (e.g., Facebook, Google docs). The figure at the right illustrates how these various classes of cloud computing offerings build upon one another and offers additional examples from the commercial space. SaaS Software as a Service: Builds upon PaaS to offer complete applications customizable by the user to a limited degree and utilizing a security model developed by the provider. PaaS Platform as a Service: Builds upon IaaS to offer development environments which are leveraged by the user to build custom applications. IaaS Infrastructure as a Service: Includes the foundational elements such as storage, operating system instances, networking, and identity management upon which development platforms and applications can be layered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009