Professional Documents
Culture Documents
INTRODUCTION
1
Chapter-One: Introduction
These models and characteristics lie at the top of each other, thereb y
forming a stack of a cloud [1, 3].
2
Chapter-One: Introduction
3
Chapter-One: Introduction
4
Chapter-One: Introduction
Hybrid Communit y
cloud cloud
Composition of two Shared by
or more clouds different
organization
5
Chapter-One: Introduction
6
Chapter-One: Introduction
7
Chapter-One: Introduction
Security has been one of the most challenging issues for the IT
executives , particularl y in clou d implementation. There exist numerous
securit y anxieties that prevent companies from captivating advantages
of the cloud. Several studies quote securit y as the primary level
confront for cloud users [ 19]. The security challenges are classified in
deplo yment models, service models and network, which are shown in
Fig. 1.2. The security issues of cloud computing have been exposed in
deployment and service models. The securit y challenges with respect to
the network are the most imported because for any Internet-based
services, a network is considered as the backbone for the cloud
computing.
1.5 OBJECTIVES
The research objectives of investigation of cloud adoption issues
and design of a secure cloud computing environment are as follows:
8
Chapter-One: Introduction
9
Chapter-One: Introduction
scripting languages and are managed with HTML5 WebDB at the client
side. The proposed approach can protect applications and data from
unauthorized access .
10
Chapter-One: Introduction
11
Chapter-One: Introduction
Design a suitable web service API for the secure cloud in mobile
cloud environment.
Cloud computing frameworks such as , Google App Engine,
Amazon Web Services, Windows Azure, and open source frameworks
such as, OpenStack have become increasingl y popular among
practitioners . Also, the growth in usage and deployment of smartphone
platforms and applications worldwide is increasing rapidl y . Mobile
Cloud Computing (MCC) promotes the use of cloud based services in a
mobile environment. Data and complex computing modules are
processed in clouds and mobile devices do not need a powerful
configuration such as, CPU speed and memory capacity. Mobile
devices are unable to utilize resources , communication delay, and
unexpected mobile vulnerabilities or attacks. These challenges have a
great effect in the improvement of service qualities of mobile cloud. In
this objective, the survey of different vulnerabilit ies and attacks on
mobile cloud computing are identified and also, we have designed a
secure mobile cloud storage environment through an encryption
algorithm. The proposed work focuses on the solution for the threats
that are the major issues for MCC adoption.
12
Chapter-One: Introduction
13
Chapter-One: Introduction
14
Chapter-One: Introduction
CSP, TPA, and mobile cloud storage is proposed for secure MCC
environment. Chapter seven also presents secure MCC storage with
encryption and decrypti on of data and illustration.
15