You are on page 1of 3

CLOUD COMPUTING

Review paper by Prince

ABSTRACT
A cloud is a pool of virtualized computer resources. A
cloud can do self-recovering, host a variety of different
workloads. Cloud computing will have excellent scope in
future as it has more opportunities. It is more secure, no
data lose, easy to backup, easy to recover, more space.
Companies will use it in place of hard disks for their data
storage. But there’s a risk till now in cloud computing
because it can monitor all its cache files frequently but
only sharp minded hacker may do it others can’t access
others account without password. Cloud provides four
types of services: IAAS, PAAS, SAAS and UCAAS. It is
classified into three categories: Public, Private and
Hybrid. Different clouds for different purpose and for
different organisation but the function of all clouds are
same.

Keywords: future aspects, security and Deployment
models.

third parties at remote locations. The cloud computing
model allows access to information and computer
resources from anywhere that a network connection is
available. Perhaps the most famous use of cloud
computing, which does not strike people as "cloud
computing" at first glance is social networking Websites,
including Facebook, LinkedIn, MySpace, Twitter, and
many, many others. Different, Different organisations
use cloud for their storage either for their personnel use
or for their clients.

2. Future aspects
Cloud computing is now becoming a business standard.
It provides a virtual storage space to the user which could
be used without bothering about the details of the entire
mechanism. Here are some other reasons why every
enterprise might need cloud computing for their business:
2.1
Cost savings - Cloud computing removes
the requirement of a company to invest in
storage hardware and servers.
2.2

Focusing on the business -Since all the
services will execute over the internet, a
company does not have to difficulty about
technical concerns and other problems
associated with physical storage. A
company can thus focus more on their
primary business.

2.3

Performance - It delivers reliable
performance regardless to the user.
Another important feature could be the
automatic updating of services and
applications.

1. Introduction
Cloud computing refers to the delivery of the computer
resources over the internet. Instead of keeping data in
your hard disk or in any other storage device , user use a
online storage device for your photos, videos or any other
documents or use an any networking sites or web mail,
that means user can is using a “cloud computing”
services. Cloud offers many services to individuals and
others to use software and hardware that are managed by

2.4

Security - Cloud Computing offers ideal
security which protects you against any
unauthorized access, modification and
loss of data.

2.5

Flexibility - Even if part of the cloud
environment fails or stops working, the
other resources continue to work until the
problem is fixed.
There is no specific qualification required to
learn Cloud Computing. The candidate should
preferably be from an IT or computer related
background so that he has the general
knowledge about computers and programming.
Knowledge of cloud computing basics or any
relevant experience could be a great add on to
get a job. The roles in Cloud Computing might
range from cloud developers to operators.
Every role comprises of the knowledge of the
cloud computing basics and certain domain
specific skills. Here are some of the popular
Cloud related job profiles:

Cloud Software Engineer

Cloud Project Manager

Cloud Business Analyst

Cloud Network Architect/Planner

Cloud Product Manager

Cloud Sales Executive

Cloud Developer/Programmer

Cloud Consultant

Cloud Systems Engineer

Cloud Systems Administrator

Cloud Network Engineer
The demand for professionals with knowledge
of Cloud Computing is expect to rise
exponentially because more and more
companies are implementing this technology.
3. Security
Organizations use the Cloud in a variety of
different service models like: SaaS, PaaS, IaaS
and deployment models like: Private, Public,
and Hybrid. There is number of security issues
associated with cloud computing but these
issues fall into two broad categories: Security
issues faced by cloud providers and security
issues faced by their customers. In most cases,
the provider must ensure that their
infrastructure is secure and that their client’s
data and applications are protected while the
customer must ensure that the provider has
taken the proper security measures to protect
their information. Virtualization is a part of
cloud computing which alters the relationship
between the OS and underlying hardware - be
it computing, storage or even networking. This
introduces an additional layer virtualization,
that itself must be properly configured,
managed and secured. Cloud security
architecture is effective only if the correct
defensive implementations are in place.
Efficient cloud security architecture should

recognize the issues that will arise with
security management. The security
management addresses these issues with
security controls. These

3.1

3.2

3.3

3.4

Controls are put in place to safeguard any
weaknesses in the system and reduce the effect
of an attack. While there are many types of
controls behind cloud security architecture,
they can usually be found in one of the
following categories:
Deterrent controls
These controls are set in place to prevent any
purposeful attack on a cloud system. Much like
a warning sign on a fence a property, these
controls do not reduce the actual weakness of a
system.
Preventative controls
These controls upgrade the strength of the
system by managing the weaknesses. The
preventative control will safeguard weaknesses
of the system. If an attack were to occur, the
preventative controls are in place to cover the
attack and reduce the damage and destruction
to the system's security.
Corrective controls
Corrective controls are used to reduce the
effect of an attack. Unlike the preventative
controls, the corrective controls take action as
an attack is occurring.
Detective controls
Detective controls are used to detect any
attacks that may be occurring to the system. In
the event of an attack, the detective control will
signal the preventative or corrective controls to
address the issue.
Every enterprise will have its own identity
management system to control access to
information and computing resources. Cloud
providers provide an identity management
solution of their own. Cloud providers ensure
that applications available as a service via the
cloud are secure by implementing testing and
acceptance procedures for outsourced or
packaged application code. Cloud providers
have business link and data recovery plans in
place to ensure that service can be maintained
in case of a misadventure or an emergency and
that any data loss will be recovered. These
plans are shared with their customers. Legal
issues may also include records-keeping
requirements in the public sector, where many
agencies are required by law to make electronic
records in a specific way.

4. Deployment Models
The cloud is not a technology. It’s more of an approach
to building IT services- an approach that harnesses the
power of services, as well as virtualization technologies
that combine servers into large computing pools and
divide single servers into multiple virtual machines. And
there are several different deployment models for
implementing cloud technology.
The four Cloud models are:
 Public
 Private
 Hybrid
 Community
Public: The Public cloud deployment model
represents true cloud hosting. Services and
infrastructure are provided to various clients.
Example of it: Google. The services that can be
provided by a vendor free of charge or on the basis
of a pay-per-user license policy.
This can be the most cost effective deployment
model for agencies as it gives them the flexibility to
produce only the computing resources they need and
delivers all services with consistent availability,
resiliency, security, and manageability.
Private: A Private cloud is a virtualized data centre
that operates within a firewall. Private clouds are
highly virtualized, joined together by mass
quantities of IT infrastructure into resources pools,
and privately owned and managed. Still, it brings in
tremendous value from a security point of view.
During their initial adaptation to the cloud, many
organisations face challenges and have concerns
related to data security.
Security concerns are addressed through secureaccess VPN or by the physical location within the
client’s firewall system.
Several SAAS applications, such as sugarCRM,
provide options to their clients to maintain their data
on their own premises to ensure data privacy is
maintained according to the requirements of the
particular business. Amazon also provides the
option of a virtual private cloud.
Hybrid: A hybrid cloud is a mix of public and
private clouds. This deployment model helps
businesses to take advantage of secured applications
on the public cloud. This model is also used for
handling cloud bursting, which refers to a scenario
where the existing private cloud infrastructure is not
able to handle load spikes and requires a fall-back
option to support the load. Hence, the cloud
migrates workloads between public and private
hosting without any inconvenience to the users.
Examples of Hybrid cloud are Force.com and
Microsoft Azure.
Hybrid deployment models are complex and require
careful planning to execute and manage especially
when communication between two different cloud
deployments is necessary.
Community: A community cloud is an
infrastructure shared by several organisations which
supports a specific community. This helps to further

reduce costs as compared to a private cloud, as it is
shared by larger group.
Various state-level government departments
requiring access to the same data relating to the
local population or information related to
infrastructure such as hospitals, roads, electrical
stations etc. can utilize a community cloud.
When agencies have a common set of requirements
and customers, a community cloud enables them to
combine assets and share computing resources, data,
and capabilities. By eliminating the duplication of
similar systems, agencies can save money and
allocate their scarce resources more efficiently.
Procuring a community cloud is also a way that an
agency can advance the Federal IT Shared Service
Strategy.

5. Conclusion
As we studied so far it is clear that the cloud
computing has a vast scope in the future, there are a
lot of job opportunities and it might be very helpful
in the IT sector to store their important data on
cloud so as to get there data secured. Cloud
computing will be helpful in every field as it is
secure, time relevant, cost saving and portability.
Windows azure is a good example of cloud
computing. In case we lost our data we can recover
it any time on cloud computing.

6. References








Neha_Jain_1466_Review_Article_
VSRDIJCSIT_March_2013
http://csrc.nist.gov/groups/SNS/clou
dcomputing
http://en.wikipedia.org/wiki/Cloud_
computing_security
http://www.thinkvidya.com/a/cloudcomputing-future-scope/
http://www.unc.edu/courses/2010sp
ring/law/357c/001/cloudcomputing/
examples.html
en.wikipedia.org/wiki/Cloud_comp
uting/
cloud.cio.gov/topics/cloudcomputing-deployment-models
cloudtweaks.com/2012/07/the-4primary-cloud-deployment-models/
www.conres.com/cloud-computingdeployment-models