secure environment for cloud

Upload: mrmrama2008

Post on 03-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 secure environment for cloud

    1/4

    A Secured Environment for Cloud Computing

    ServicesM.Nandhini#1, M.Thariga#2

    #1Assistant Professor,

    Department of Computer Science, Pondicherry University

    Puducherry, India-14.#Department of Computer Science, Pondicherry University

    Puducherry, India-14.mnandhini2!"ahoo.com, mthariga.$%&'".gmail.com

    Abstract:Cloud computing has emerged as a most

    important technological breakthrough for small to

    medium scale enterprises and software users who

    are looking for dynamic scalability at a low or zero

    initial investment. This paper offer a brief view on

    cloud services; evolution of cloud computing; and

    an outline of the opportunities cloud services bring

    to the enterprise. Also, proposing one secured

    architecture for cloud computing using M! and

    A"# algorithm in cloud data server.

    Keywords: Cloud computing, architecture, security,

    models, services.

    (. (NT)*+CT(*N

    The (nternet has e-perienced massive increase in thelast decade, and hundreds of millions of users no

    depend on it for dail nes, entertainment and

    commerce. Cloud Computing is a ne processing

    method in hich computer processing is performed in

    the internet called /Cloud0 meaning that the user need

    not concern ith the processing details. Cloud

    computing is a general term for anthing that involves

    delivering hosted services over the (nternet. Cloud is an

    environment here properl secured, highl scalale,

    and elastic services can e easil consumed over the

    (nternet on an asneeded asis. (n Cloud computing, theprivac and securit concerns ill differ eteen

    consumers using a pulic cloud application, a medium

    si3ed enterprise using a customi3ed suite of usiness

    applications on a cloud platform. The shift of each

    categor of user to cloud sstems rings a different

    pac4age of enefits and ris4s.

    According to the 5ua617 et al. Cloud Computing

    is defined as8 /a type of para!!e! and distri"uted systemconsistin of a co!!ection of interconnected and

    virtua!i$ed computer that are dynamica!!y provisioned

    and presented as one or more unified computin

    resources "ased on service-!eve! areements0.

    The Cloud Computing came into e-istence

    ith the folloing reasons8

    9o Costs

    9o 5arriers to Entr

    (mproving Securit

    (ncreased Moilit

    9imitless Scalailit

    Strong Compliance

    (n this paper e present a secured environment for

    Cloud Computing services. The paper is organi3ed as

    follos8 first, evolution of Cloud Computing: ne-t,

    descriing the services provided the Cloud: and at

    last descriing securit in architecture hich ould

    ma4e Cloud Computing in highl secured manner.

    ((. E;*9T(*N *< C9*+

    C*M=T(N>

    Evolution of Cloud Computing is shon in

  • 8/12/2019 secure environment for cloud

    2/4

    Proceedings of National Conference on Advanced Computing and CommunicationNCACC11, April.1, !"11

    each other through fast local area netor4s. 5ut it is

    not alas connected to the internet.

    2? Super Computin% Super Computing ill perform

    a specific tas4 ver fast nearl illions of instructions

    per second. 5ut it ill perform a single tas4 at a time.

    @? &rid Computin% >rid computing is a term

    referring to the comination of computer resources

    from multiple administrative domains to reach a

    common goal. The grid can e thought of as a

    distriuted sstem ith noninteractive or4loads that

    involve a large numer of files.

    ? Uti!ity Computin% tilit Computing is the

    pac4aging of computing resources, such as

    computation, storage and services, as a metered service

    similar to a traditional pulic utilit Bsuch as electricit,ater, natural gas, or telephone netor4?. This model

    has the advantage of a lo or no initial cost to acuire

    computer resources: instead, computational resources

    are essentiall rented turning hat as previousl a

    need to purchase products Bhardare, softare and

    netor4 andidth? into a service.

    After all these computing process, Cloud computing

    emerged and this has all these technologies or4ing

    together and it has three services such as =aaSBplatform

    as a Service?, SaaSBSoftare as a Service?,

    (aaSB(nfrastructure as a Service?.

    (((. C9*+ C*M=T(N> SE);(CES

    AN+ M*+E9S

    A. C!oud Computin Services

    The

  • 8/12/2019 secure environment for cloud

    3/4

    Ad#iparasa$t#i %ngineering College, &elmaruvat#ur

    2? Pu"!ic C!oud% (n simple terms, pulic cloud

    services are characteri3ed as eing availale to clients

    from a third part service provider via the (nternet. The

    term /pulic0 does not alas mean free, even though

    it can e free or fairl ine-pensive to use. A pulic

    cloud does not mean that a userFs data is pulicallvisile: pulic cloud vendors tpicall provide an

    access control mechanism for their users. =ulic clouds

    provide an elastic, cost effective means to deplo

    solutions.

    @? y"rid C!oud%A hrid cloud is a comination of

    a pulic and private cloud that interoperates. (n this

    model users tpicall outsource nonusiness critical

    information and processing to the pulic cloud, hile

    4eeping usinesscritical services and data in their

    control.

    (;. C9*+ C*M=T(N> A)CG(TECT)E

    The sstem primaril is composed of cloud

    =artners, local servers and cloud central sstem. The

  • 8/12/2019 secure environment for cloud

    4/4

    Proceedings of National Conference on Advanced Computing and CommunicationNCACC11, April.1, !"11

    to the C+S. The C+S ill encrpt the hash code in a

    high manner to response for the reuest. Hhen the

    cloud offers response information it is encrpted using

    AES algorithm and sent to the user, thus resulting ith

    secures information transfer.

    C. C!oud User

    The Cloud user ill receive the information

    securel. The (S Applications0, The niversit of Melourne,Australia,http8LL.cloudus.orgLspande

    9

    http://www.amazon.com/http://www.amazon.com/http://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.cloudbus.org/spandeyhttp://www.cloudbus.org/spandeyhttp://www.amazon.com/http://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.ebook3000.com/Cloud-Security--A-Comprehensive-Guide-to-Secure-Cloud-Computing_93872.htmlhttp://www.cloudbus.org/spandey