This website uses cookies to ensure you have the best experience. Learn more

Cloud Computing Security Architecture The Computing Model For Future James Alwyn Durai Xavier

3121 words - 13 pages

Cloud Computing Security Architecture The computing model for future
James Alwyn Durai Xavier1

Abstract—In the recent years there is an increasing interest among the researchers on security aspects of the cloud computing model. This is primarily because of the evolution of this new computational model, but mainly due to the advances in the technology which brings more threat and challenges to the society at large. In this paper we are proposing a three tier security model for a cloud service provider. This addresses the concerns of the small and medium enterprise (SME) organizations at the data layer, service layer and the network layer. We have also recommended the user organization ...view middle of the document...

When the Applications become more intensive in business, the programming logic becomes complex. Also there was a need for several applications to work with each other.
James Alwyn Durai.Xavier is with the MindTree Ltd. (MCC) TP2/2 , CyberVale, Mahindra World City SEZ, Kanchipuram District, Chennai – 603002, Tamilnadu, INDIA phone: +91 994 066 2430; fax:+91446749 7100; e-mail: Jamesalwyndurai_Xavier@mindtree.com ). .
1

In business, the applications have evolved over a period of time and hence every organization uses several applications which work with each other through interfaces and common integration platforms such as EAI. For example, the following are some key applications used in the Insurance Industry. 1) Sales support system: Used for managing the Agents details, 2) Customer Relationship Management System: Used for adding new customer, modifying their details such as address, policy payment schedule etc. 3) Policy Management system: Used for creating new insurance policy, validation of the policy details, data provided by the customer and approval of policy acceptance 4) Loan management system: Customers are eligible to take loan by pledging the policy document. This system is used for managing the loans 5) Policy Premium payment management system: used for reminding the premium payment, electronic fund transfer, online payment, cheque payment, etc. 6) Insurance Policy Settlement system: used to manage the part and final settlements These applications are working with each other. Each of the application is viewed as a layer of Hardware, Operating system etc. as shown in Figure A and described below

Fig 1.Business Application structure

A. Hardware/Network When applications are installed, the IT team of the user has a discussion with the application developer/owner to decide on the Hardware and Network sizing. The following inputs are required to finalize the hardware size. 1) Volume of Transaction accepted in the peak hours and in off-peak hours. 2) Volume of Reference Data. 3) Performance Requirement. How quickly the Application must respond. 4) Number of concurrent users 5) Number of users. 6) Preferred Hardware manufacturer (HP,IBM,DELL etc) 7. Data Resilience: Amount of history to be maintained (30 days,45 days etc.) 8. Roadmap on volume for the next year. Based upon the above input the application owner can recommend the hardware Configuration required for the application. B. Operating System The operating system may be chosen as per the Recommendation of the application owner/developer. 1. Sun Solaris-UNIX 2. IBM AIX-UNIX 3. HP UX-UNIX 4. MS Windows XP 5. MS Windows 7 In the case of COTS products, the ISV sells packages for every operating system, leaving the choice of operating system to the user. C. Software Tools Every application requires some software tools to run. For example if the system is developed in Java, JVM (Java Virtual Machine) is required. Depending upon the system, the developer will recommend specific...

Other Papers Like Cloud Computing Security Architecture the Computing Model for Future James Alwyn Durai Xavier

Cloud Computing Essay

3888 words - 16 pages architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk. 2.Cloud Computing Security Requirements and Solutions: -Patrick Höner Abstract Although the technology and its application are not new, the rising awareness and implementations of cloud services and its underlying technologies cause the need for

Cloud Computing Essay

3408 words - 14 pages , hybrid cloud provides the ability to “bursts” to a public cloud which extends the temporary capacity needs. Mollahasani, Kooshesh, & Barzegar stated “A primary advantage of cloud bursting and a hybrid cloud model is that an organisation only pays for extra compute resources when they are needed” (2013, p. 2172). 5 Issues 5.1 Security In order to sustain trust in cloud computing technology, security concerns must be addressed. There has been a

Cloud Computing

1740 words - 7 pages entire server for storage, clients pay the service provider depending on their usage. What are the downsides? Like any product, it has its faults. The disadvantage of cloud computing (Roger, 2013, p1-2): * Security There is a potential risk of privacy and security when sensitive data is being stored in someone else’s server. Furthermore, there is a potential of information being leaked into other users who are sharing the same server

Cloud Computing - 3582 words

3582 words - 15 pages computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Details are abstracted from the users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically

Cloud Computing - 1456 words

1456 words - 6 pages stresses on getting applications to market very quickly, by using the most appropriate building blocks necessary for deployment. Cloud Computing Challenges Despite its growing influence, concerns regarding cloud computing still remain. In our opinion, the benefits outweigh the drawbacks and the model is worth exploring. Some common challenges are: 1. Data Protection Data Security is a crucial element that warrants scrutiny. Enterprises are

Cloud Computing - 1416 words

1416 words - 6 pages This paper will explain cloud computing services and the future of this information technology system. Reasons cloud computing will be a paradigm shift in the way information technology will be designed, managed and used will be discussed. An explanation for the drive towards this change and pro’s and con’s surrounding the move. Also, details explaining the cloud computing, how it works, and how it is different from what we have today

Cloud Computing - 572 words

572 words - 3 pages better. 2- Harms of Cloud computing. a. Security issues. b. Maintenance. c. Lack of support. d. How to fix these issues. Conclusion: 1- Summary. 2- Answer the question of the introduction briefly by connecting the dots from the collected data. References Figures and Table Abstract Cloud Computing is the new generation of this era. Cloud computing is a controversial subject for the users because of

Cloud Computing - 1651 words

1651 words - 7 pages . Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation. Perhaps the biggest concerns about cloud computing are security and privacy

Cloud Computing - 1414 words

1414 words - 6 pages per Use: Organization need to "pay per use" i.e. organization need to pay only as much for the computing infrastructure as they use. The billing model of cloud computing is similar to the electricity payment that we do on the basis of usage. The cloud computing is the computing which is completely based on the Internet. It can also be defined as the next stage in the evolution of the Internet. The cloud computing uses the cloud (Internet) that

Cloud Computing - 1248 words

1248 words - 5 pages needs to be more stringent than with a self-hosted, internal-use-only app. The largest problem with the Cloud, security-wise, is that it is inherently centralized. This sounds counter-intuitive, since "cloud" would seem a symbol for "many," but the model of cloud computing is based on a centralized service offering application(s) to individual systems. For this reason, the primary security concern of the IT manager who utilizes cloud-based services

Cloud Computing - 1555 words

1555 words - 7 pages is looking bleak for the onsite IT infrastructure model. IT equipment is aging quicker (it is reported 30% faster). Oracle also found that somewhere around 80% of some companies IT budget tends to spent on maintenance and integration instead of innovation. (Iren, 2016). The managing director for Oracle Nigeria said “The world is moving from on premise to cloud. The train has left already; that is the future. Cloud computing provides better, more

Related Essays

The Future Of Cloud Computing Essay

1082 words - 5 pages resource allocation in the MCC environment through efficient task distribution and offloading, security and privacy. Mobile cloud computing has recently attracted significant attention from both academia and industry. According to a recent study from Heavy Reading [9] the direct revenue of mobile cloud market will grow to about $68 billion by 2017. It is expected to achieve $1 trillion for the broader mobile cloud market. A similar forecast has

Cloud Computing Security Essay

1330 words - 6 pages Managing the security of an Electronic Medical Record (EMR) system in a cloud computing environment can be challenging. Even without the addition of the cloud computing environment, the EMR system is vulnerable to the compromise of login information, unauthorized viewing or editing of medical records, and denial of service attacks. First of all, the data contained within the Electronic Medical Record (EMR) itself is sensitive. Inside the

Inf 103 The Future Of Cloud Computing

1761 words - 8 pages people have spent a good amount of time pondering. We’re seeing a new trend in software deployment and flexibility goal sets, and as a result, the future may be a different one from what we once envisioned. However, the future of cloud computing is not only recent to be pondered by computer scientists. Quite the contrary, the cloud model dates back to the 1960s as far as being a real theory for deployment. Scientists of the 1960s envisioned

Cloud Computing Essay 4887 Words

4887 words - 20 pages to install, configure, assess, run, update and ensure their security. Durkee (2010, p. 62-66) states that it is based on the above challenges that cloud computing was established; not only to overcome the challenges, but also to provide better prospects for organizations that rely on computing for their survival. Even though cloud computing has been around for a few years, it has—to a great extent—overcome the challenges of traditional