Wednesday, 30 May 2012

CLOUD COMPUTING

Cloud computing is the term which use for delivering internet services. The word cloud is a actually is a symbol which used as a diagram or flowchart to understand the cycle and how it works. Cloud computing is based on three different pillars such as infrastructure, software and platform.

Cloud computing can also be understand with the help of the examples of Yahoo, Hotmail, Gmail or for that reason all most of the social networking sites a user dont need any software or highly equitably rooms all they need is internet connections with which they can connect with those sites and they can chat or email to one and another all the software or interface are in cloud.

Cloud computing works differently then usual or traditional way it has mainly three characters and all these three mirrors are favorable for the users.

1) it has a demand a supply balance will be supply as much of user need.
2) it supply on minute to minute or hourly bases again for the convenience of users timing.
3) it depends on consumer as much or as little they want be provides.

An era where consumer often struggle with the speed and data distribution problem at this time when consumer scared to spend on software this brainy innovation not only resolving the demand and supply problem not only meets the demand of users but also providing the economical users don't have to spend on software or any team to use these services.

Cloud computing this service is could be for any one from home user to professional, from public sector to private Amazon web services is the largest service provider to general users as of now for private user provider s stick to a particular group or company however who ever is providing to any consumer the aim is to provide the services which consumer demand.

ref : wikinvest.com

Tuesday, 29 May 2012

CLOUD COMPUTING END-USER ANALYSIS- MEXICO

Most of the major factors driving adoption of the cloud computing concept by companies in Mexico are the same ones that boost more markets such as the USA and Western Europe.Fortunately for the Latin American and Caribbean region, countries such as Brazil,Colombia and Chile were not so effected by the economic crisis as some other economies, prompting initial Cloud computing investments already in 2009. The implicit cost reduction that the Cloud computing pricing model suggests is seen by both CIOs and CFOs as one of the strongest drivers in the Latin American and Caribbeans region.The decision to explore cloud computing was primarily driven by economics.
Cloud Computing is flexible and scalable shared and /or private environment in which third-party supplier or in house architectures use virtualization technologies to create and distribute computing resources on as needed basis, via the Internet browser.


Reference:
Economics Week via VerticalNews.com.

Monday, 28 May 2012

SHALL WE TRUST IN CLOUD COMPUTING ?

      Cloud computing has opened a new frontier of challenges by introducing a different type of trust scenario.Today' the problem of trusting cloud computing is a paramount concern for most enterprises.It's not that the enterprises don't trust the cloud providers' intensions; rather, they question cloud computing's capabilities.The challenges of cloud computing doesn't lie entirely in the technology itself.The dearth of customer confidence also stems from a lack of control over data assets, and unclear securityassurances.The adoption of cloud computing came before the appropriate technologies appeared to tackle the accomplanying challenges of trust. This gap between adoption and  innovation is so wide that cloud computing consumers don't fully trust this new way of computing.To close this gap, we need to understand the trust issues associated with the cloud computing from both a technology and business perspective. then we'll be able to determine which emerging technologies could best address these issues.
    Broadly speaking, trust means act of faith; confidence and reliance on something that's expected to behave or deliver as promised.we trust a system less if it gives us insufficiant information about it's expertise.The claims such as "secure cloud' or "trust me" doesn't help much to boost the trust level of consumers unless sufficient information is presented with the services.New technology must gradually build it's reputation for good performance and security.


Reference:
B. Michael, “In Cloud Shall We Trust?”
& PrivacyIEEE Security, Sept./Oct. 2009, p. 3.

THE TECHNICAL PRINCIPLE OF CLOUD SECURITY

Cloud Security is a new noun evolved from cloud computing .Cloud Security plan reflects the latest information Security of network times. It includes parallel processing, grid computing, unknown viruses judgment and other new technologies and concepts. Through the detection of the software network behavior via the grid, it obtains the latest information of the Internet Trojan horses, malicious software and to do automatic analysis and processing by sending them to the server, and then distribute the solutions of the viruses and trojans to every client-side. Because the antivirus software in future will not be effective in treating with increasing numbers of malicious programs, the main threat from the Internet is still computer viruses, malicious software and trojan horses.In this case,the method of using the feature database to do identifying job is out of date abselutely. The applications, identification and killing the virus of Cloud security technology no longer just depends on the virus database of a local hard disk, but rather to do collection, analysis and processing in time with the help of the huge network service. In short, the Internet is a huge "antivirus software". The more the participants are,the safer each participant is , and the whole Internet will be much safer.


Reference:

CLOUD PRIVACY AND KEY FACTORS IN PRIVACY PROTECTION


                The cloud will typically process and store the information about which privacy is a paramount concern.the main issue is identity, which serves as the basis of privacy or lack of it, and underlines the trust of individuals and organisations in other entities. The key consideration is the intefrity that organisations adopt when handling personal information. From an organisation's perspective, control over information should remain with the end user or the data's creator with adequate controls ove4r repurposing.From a personal perspective, the person should have the wherewithal to control his or her identity as well as the release of socially sensitive identity attributes. Who owns the data?Is the person about whom the data pertains?Is it the organisation that prototypically stores tha data? Or, is it the cloud provider that physically stores the data somewhere out in cyberspace? As an example, is your financial information (as personal data) your property or is it uour bank's business property?

One of the beneficial aspects of the present concern over the information privacy is that it places the person about whom data are recorded in proper perspective.Whereas such person may be the object in an information system and is regarded as the subject in privacy protection.and that subject is intended to imply that a person should in fact have some control over the storsge of personal information.
More specifically, the subject is the person ,natural or legal, about whom the data are stored. The beneficial user is the organisation or individual for whom the data is performed, and the agency is the computing system in which the processing is performed and the information is stored. For example, the agency may be the service conmpany and the subject is the creditor.
In general, the beneficial user obtains the value from the data processed and has some control over the manner and time span in which the processing is performed. The agency need to be aware of the end use of the information or how and when the processing is performed.
The heart issues is the privacy protection, which normally refers to the protection of rights and individuals. While the concept may also apply to individuals, the individual aspect of the issue is that which raisess questions of privacy and liberty.



References:
Gellman, R. 2009. Privacy in the Clouds: Risks to Privacy and Confidentiality form Cloud Computing. World Privacy Forum (February 23, 2009).
Conti, G. 2009. Googling Security. Upper Saddle River, NJ: Addison- Wesley.

ADVANTAGE OF CLOUD COMPUTING

The Benefits of Cloud Computing
some of the advantages to using cloud computing for different types of  companies as follows
  • cloud computing provides lots of flexibility to the user.  meaning of clous computing is to allow the staff to access the files and data that they need even when they're working remotely and/or outside office hours.
  • cloud computing is easily accessable if there is internet it can also used from smart phone such as Black Berry or iphone.
  • Cloud computing helps to make everyone together even though physically ther are not Documents can simultaneously be viewed and edited from multiple locations.
  • in compair to others downloading software through cloud computing in much easier , cheaper, and less labour intensive for companies.There is no need to buy and install expensive software because it's already installed online remotely and you run it from there, not to mention the fact that many cloud computing applications are offered free of charge. The need to pay for extensive disk space is also removed
With cloud computing, you subscribe to the software, rather than buying it outright. This means that you only need to pay for it when you need it, and it also offers flexibility, in that it can be quickly and easily scaled up and down according to demand. This can be particularly advantageous when there are temporary peaks in demand, such as at Christmas or in summer, for example.
"A major advantage of using cloud computing for many companies is that because it's online, it offers virtually unlimited storage compared to server and hard drive limits. Needing more storage space does not cause issues with server upgrades and equipment - usually all you need to do is increase your monthly fee slightly for more data storage."

reference

FEATURES OF CLOUD COMPUTING

The features of cloud computing are talked about under:
1 .VLDB :
The clouds had a certain scale, Google cloud computing has made more than 100 ten thousand servers, Amazon IBM and Microsoft Yahoo clouds have  thousands of server .Enterprise private cloud generally have  thousands of server. Cloud can give users unprecedented computing power.
2.Virtualization :
Cloud computing support users in any position to use all kinds of terminal for application service. the requested resources from cloud, rather than a fixed tangible entity .In the cloud application running,  in fact, user need not know and  worry about the location of application.They oly need a laptop or a mobile phone to meet our need through network service everything, even including supercomputing such task.
3.Reliable:
Using the data cloud computing node copy more fault-tolerant isomorphism interchangeable measures to guarantee service of high reliability.It is more reliable to use cloud computing than using the local computer.
4.Security:
Security provided by cloud computing is sweet for the reason that information over right here is centralized. Te centralization of knowledge improves the safety on the centered resources. The safety provided by this computing service is means better than the safety provided by different conventional systems.
5.Extensibility:
The scale of the cloud can be dynamic expansion, and meet the user  growth needs.
These great features of cloud computing make it the primary choice of the users.


Reference:http://news.xinhuanet.com/eworld/2010-07/17/c_12342957.htm

CLOUD COMPUTING UTILISATION

            There are four main actors to speak in cloud computing: the cloud provider, the software service provider, customer and the user.Each of them represents centres of computer-related activity that can overlap to some degree.The service provider owns the the infrastructure, hardware, software, and the network facilitiesneeded to supply cloud computing managed by the operating system.CSP performs as function that can be used to run computer programs and is known as cloud platform (CP).Cloud platform provides service to applications in the same way that "software as a service" programs provide to their client using the cloud as a media.Cloud Platform is much more about operating.The SSP is an independent software that develops software package as delivering vehicle for computing and provides applications to the customwers.The customer (C) is comprised of of several employees that use the application and are regarded as users.The user (U) is a person that uses cloudcomputing service via a web browser.the user can either be an employee of an organisation that is contracted to use SaaS provided by an ISV or acquired independently to run in the cloud.
For example, we will  be using CSP-CP-ISV-C-U if  our company has acquired an operational package from a software vendor and is hosting that software in the cloud.Similarly, we will be using CSP-CP-U if we are using an office package provided by CSP and  accessed via browser.
Concluding, this form of conceptualization is important from a privacy point of view, because each exchange between modules represents a touch point for privacy concerns.


References:
Chappell, D. 2009. Introducing the Windows Azure Platform. Microsoft Corporation.
Cavoukian, A. 2009. Privacy in the Clouds. Toronto: Information and Privacy Commission of Ontario (www.ipc.on.ca).

PRIVACY QUESTIONS IN CLOUD COMPUTING TODAY

There raised some valid questions about the security and privacy of cloud computing today;such as
  • Are hosted data and applications within the cloud protected by suitably robust privacy policies?
  • Are the cloud computing provider’s technical infrastructure, applications, and processes secure?
  • Are processes in place to support appropriate action in the event of an incident that affects privacy or
    security?
Security is an essential component of strong privacy safeguards in all online computing environments, but security alone is not sufficient. Consumers and businesses are willing to use online computing only if they trust that their data will remain private and secure.The ability of cloud computing providers to live up to these expectations is critical not only for the future of cloud computing but also for protecting fundamental rights of privacy and freedom of expression. Microsoft has been examining and addressing privacy challenges in the evolving cloud computing realm for well over a decade. Our extensive experience has helped us develop well-defined business practices, privacy policies, and security measures that govern our cloud computing ecosystem. Recognizing that the cloud poses some new security and privacy challenges, we believe that our current policies and practices provide a solidbfoundation for addressing privacy issues and enabling greater trust in the Internet going forward.

reference
www.globalfoundationservices.com/security/documents/SecuringtheMSCloudMay09.pdf

Monday, 21 May 2012

PRIVACY UNDER CLOUD COMPUTING

Cloud computing requires a lot of  participation of the users, so it  inevitablely is faced with  emergent problem of privacy. The participation of users means to collect some data of the users, thereby it leads to the user's worry about data security. Many users are concerned about their privacy data will be collected by cloud technology . Because of this, before joining the cloud computing plan, a lot of manufacturers are committed to avoid collecting user privacy data. Even if these data are collected, they will not be showed or used. But many people still doubt that the firm commitment, and their doubt also have some reasons. Many well-known manufacturers have been accused of having may disclose user privacy, and some relevent events  occurs some times.

There are some basic methods to protect the privacy of users.Firstly,the users should know about the storage position of their data.For example, Google allows customers to specify the position of their Google Apps data .Secondly,the encryption of data should be taken. Data encryption can reduce the risks of both inadvertent and malicious disclosure of the users' data ,not only the data that are stored in the server of the cloud computing service provider,but also the data that are transmitted to the end users.

Based on all above,the privacy problem is still a big one.It is expected that some new policies be adopted and to reduce the problems of the disclosure of user's privacy.



references

CLOUD COMPUTING MODEL

There are three common models in cloud computing  IaaS , PaaS and SaaS. They offer users different levels of control to provide software and hardware services on-demand from a remote host.






LaaS (Infrastructure - as -service) The users can get service from computer infrastructure though internet.The user does not control the infrastructure.

PaaS(Platform -as - a - service):The service given to the user is to install on infrastucture of cloud system by user itself or acquired application that may be written in programming  language and using tools provided by the service provider.  The end user can control the installed applications but he can not control the infrastructure of cloud computing system .Actually,PaaS is another application of SaaS.It makes SaaS develop faster.

SaaS(Software - as- a - service):It is a kind of pattern via internet provide software.The customer use application which are easily accessible from client device and does not control the cloud infrastructure  including network .operating system and so on.

CLOUD PROVIDERS AND THEIR SECURITY SYSTEM

When it comes to private cloud, firstly we think of it's security.According to the research i made on Proquest, i came to know that there are lots of open source cloud providers which are helpful in creating private cloud for the organization.Among them Eculyptus,Open Nembla and Nimbus are fomous open source cloud tool kit and it also has strong security features.Eculyptus is an acronym for elastic utility computing architecture linking programs to useful system.It is an opensource  software infrastructure for implementinting cloud computing on clusters.And it always uses WS-security for authentication.Open Nebula is designed to help the business use cases from leading companies and across multiple industries such as Hosting, Telecom etc.It uses SSH to access VM over the network to provide security.Nimbus is little more specificially as an Infrastructureeas-a-service(IaaS) solution.It can make use of our web services interface with X509 certificates.It has very strong security and is very convinient for institutions that uses DOE certificatesor any other cerficate authority.
Concluding, each open source toolkit has it's own security measures,which should be analyzed by the organization before implementing an in-house cloud.So,the organizations must have decide which cloud they ahold utilize.




Reference:

Friday, 4 May 2012

THE FUTURE DATA CENTRE-THE CLOUD


The today's concept of data centers has changed a lot.

The advent of cloud computing has flipped the way computing resources are used on it’s head. How data centers are used is changing quickly. And what’s inside is becoming more relevant to those that manage data centers, but less relevant to those who use them. Let me explain.

Operating a data center is complex. It is no longer just four walls with additional power and cooling requirements. To add complexity, the line between facilities and IT has blurred greatly. How does an organization deal with this growing complexity on top of what they’re already dealing with? Furthermore, as the complexity of the applications and services increases, so do the expertise requirements within the organization. How is every company that currently operates a data center expected to meet these growing requirements? In reality, they can’t.

Sure, cloud is one option.




WHAT IS CLOUD COMPUTING?


Let us now look into how different organizations define Cloud computing. The Microsoft says it like this:

" 
For a growing number of businesses, the journey to cloud computing starts with a private cloud implementation. A Microsoft private cloud dramatically changes the way your business produces and consumes IT services by creating a layer of abstraction over your pooled IT resources. This allows your data center to offer true infrastructure service capability as well as optimally managed application services. Microsoft private cloud solutions are built on Windows Server and System Center technology."


SIMPLE EXAMPLES OF CLOUD COMPUTING 

Most of us use cloud computing all day long without realizing it. When you sit at your PC and type a query into Google, the computer on your desk isn't playing much part in finding the answers you need: it's no more than a messenger. The words you type are swiftly shuttled over the Net to one of Google's hundreds of thousands of clustered PCs, which dig out your results and send them promptly back to you. When you do a Google search, the real work in finding your answers might be done by a computer sitting in California, Dublin, Tokyo, or Beijing; you don't know—and most likely you don't care!
The same applies to Web-based email. Once upon a time, email was something you could only send and receive using a program running on your PC (sometimes called a mail client). But then Web-based services such as Hotmail came along and carried email off into the cloud. Now we're all used to the idea that emails can be stored and processed through a server in some remote part of the world, easily accessible from a Web browser, wherever we happen to be. Pushing email off into the cloud makes it supremely convenient for busy people, constantly on the move.
Preparing documents over the Net is a newer example of cloud computing. Simply log on to a web-based service such as Google Documents and you can create a document, spreadsheet, presentation, or whatever you like using Web-based software. Instead of typing your words into a program like Microsoft Word or Open Office, running on your computer, you're using similar software running on a PC at one of Google's world-wide data centers. Like an email drafted on Hotmail, the document you produce is stored remotely, on a Web server, so you can access it from any Internet-connected computer, anywhere in the world, any time you like. Do you know where it's stored? No! Do you care where it's stored? Again, no! Using a Web-based service like this means you're "contracting out" or "outsourcing" some of your computing needs to a company such as Google: they pay the cost of developing the software and keeping it up-to-date and they earn back the money to do this through advertising and other paid-for services.





PC MANS PRIVATE CLOUD TODAY!!!




The technology changes the thoughts, perceptions and the meanings of the times as well! What the room sized computer did in yesterdays, are being performed by the handheld touch-sensitive tablet-PCS. The world is still shrinking, you don't need to carry your data in laptops and hard-disks, but can use the free data storage services provided by the Cloud Providers. The platform for the software development has changed from Integrated Development Environments (IDEs), where you were needed to install all the software's on your PC, to the Development on the Clouds which would seldom let you install any software.