FUTURE OF CLOUD COMPUTING
DEEPAK NEGI
COMPUTER SCIENCE DEPARTMENT (GRIFFITH COLLEGE DUBLIN)
INTRODUCTION:
CLOUD COMPUTING IS INTERNET BASED COMPUTING,WHERE ON DEMAND SERVICES AND RESOURCES ARE BEING PROVIDED TO USERS I.E THEY HAVE TO PAY ONLY FOR THE RESOURCES AND SERVICE THEY SHARE.IT COVERS SEVERAL DIFFERENT ASPECTS OF CLOUDS.IT PROVIDES EFECIENT SERVICES
SUCH AS STORAGE AND COMPUTATIONAL…BUT LACKS IN PROVIDING SECURE ENVIRONMENT FOR USERS DATA.EXAMPLE FACEBOOK, TWITTER, ORKUT ETC….
LITERATURE REVIEW:-
1>THE CASE FOR CLOUD COMPUTING. Robert L.Grossman
University of Illinois at Chicago and Open Data Group
2> TOWARDS TRUSTED CLOUD COMPUTING. Nuno Santos
Krishna P. Gummadi
Rodrigo Rodrigues
THE FIRST PAPER DESCRIBES ABOUT MERITS OF CLOUD COMPUTING SUCH AS IT”S SIMPLICITY, LOW PRICE AS PEOPLE PAY FOR SERVICES THEY USE, ELASTICITY AND
USAGE BASED PRICING.
IT DESCRIBES ABOUT ITS LAYERED SERVICES SUCH AS DATA MANAGEMENT, STORAGE SERVICES & COMPUTATIONAL SERVICES.
THE SECOND PAPER STATES THAT CLIENTS OF CLOUD COMPUTING CURRENTLY HAVE NO MEANS OF VERIFYING THE CONFIDENTIALITY AND INTEGRITY OF THEIR DATA AND COMPUTATION…
IT PURPOSES THE DESIGN OF TRUSTED CLOUD COMPUTING PLATFORM (TCCP).
TCCP ENABLES INFRASTRUCTURE AS SERVICE(IAAS)PROVIDERS SUCH AS AMAZON EC2 TO PROVIDE CLOSED BOX EXECUTION ENVIRONMENT THAT GUARANTEES CONFIDENTIAL EXECUTION OF GUEST VIRTUAL MACHINES.MOREOVER IT ALLOWS USER TO DETERMINE WHETHER OR NOT THE SERVICE IS SECURE BEFORE THEY LAUNCH THEIR VIRTUAL MACHINES.
CONCLUSION:-
ACCORDING TO MY VIEWS AS CLOUD COMPUTING BECOMES PREVELANT, WE HAVE BECOME MORE CENTRALIZED TOWARDS THE CLOUDS.WE HAVE FORGOTTEN THAT SENSITIVE DATA NEEDS TO BE ENCRYPTED AND SECURED THROUGH SEQUENTIAL SECURITY ROUTINES AND PROPER CHANNELIZATION OF DATA SOURCES.
FURTHER WE NEED TO DEVELOP A SECURE ENVIRONMENT THAT
GUARANTEES CONFIDENTIAL EXECUTION AND INTEGRITY OF THE USER DATA AND COMPUTATION…
FOR THIS MY SUGGESTION WOULD BE SEPARATE TRAFFIC FOR SECURE DATA.
REFERENCES: – 1. J. Dean and S. Ghemawat, “MapReduce: Simplified
Data Processing on Large Clusters,” Comm. ACM, vol.
51, no. 1, 2008, pp. 107–113.
2. S. Ghemawat, H. Gobioff, and S.-T. Leung, “The
Google File System,” Proc. 19th ACM Symp. Operating
Systems Principles, ACM Press, 2003, pp. 29–43.
[3] S. Berger, R. C´aceres, K. A. Goldman, R. Perez, R. Sailer, and
L. van Doorn. vTPM: virtualizing the trusted platform module.
In Proc. of USENIX-SS’06, Berkeley, CA, USA, 2006.
[4] Survey: Cloud Computing ’No Hype’, But Fear of
Security and Control Slowing Adoption. http:
//www.circleid.com/posts/20090226_cloud_
computing_hype_security/.
[5] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach,
I. Pratt, and A. Warfield. Live migration of virtual machines.
In Proc. of NSDI’05, pages 273–286, Berkeley, CA, USA, 2005.
USENIX Association