Cloud Computing Security: from single to Multi-clouds
Abstract
The use of cloud computing is growing fast
in many organizations. Cloud Computing provides
many advantages in terms of low cost and availability
Data. Securing cloud computing
The main factor in the cloud, and
as users often store confidential information to the cloud
storage vendors, but the providers may be
confidence. Working with "a single cloud" providers
predicted to become less popular with clients due to
risks insufficient availability and services
Internal attacker in the same cloud.
the move toward "Multi-clouds", or, in other words,
"Interclouds" or "cloud of clouds" originated
in recent times.
introduction
The use of cloud computing has dramatically increased in the
many organizations. Subashini and by Kavitha on [49] claim
that small and medium-sized companies use cloud computing
services for a variety of reasons, including the fact that they
services give you quick access to your applications and
reduce your infrastructure costs.
Cloud providers should consult the privacy and
security issues as a priority and urgent priority.
Working with "a single cloud" providers becomes
less popular among customers because of the potential problems
such as the denial of access and opportunities
that is, malicious insiders in a single cloud. in
In recent years there has been a movement toward "multiclouds",
"Mežoblačnogo" or "cloud of clouds".
background
NIST [1] describes cloud computing as "model
enabling convenient, on-demand access to the network for
shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services)
that can be quickly released and initialized with the
minimum effort or service provider
interaction ".
Cloud computing Components
The cloud-computing model consists of five
characteristics of three delivery models, and four
deployment models [1]. Five key characteristics
cloud computing are: location independent resource
combining on-demand, self-service, rapid elasticity, wide
access to the network, and measured service [51]. These five
specifications represent the first layer in the cloud
environment architecture (see Figure 1).
Cloud service providers Examples
In the commercial world, diverse computing needs
are provided as a service. Service providers may
take care of the needs of the client, for example,
maintenance of the software or acquisition of expensive
equipment. For example, a service EC2 created
Amazon provides clients scalable servers. as
As another example, the Tooltip, NSF has joined
With Google and IBM to offer academic institutions
access to large-scale distributed infrastructure [4].
There are many opportunities of cloud computing. First,
Cloud storage, such as Amazon S3, Microsoft
SkyDrive or NirvanixCLoudNAS, give consumers
To access Internet data. Secondly, it provides an evaluation
resources for users such as Amazon EC2. Thirdly,
Google apps or version control repository for your source code
are examples of online collaboration tools [12].
Cloud providers must ensure security
the data of its customers and should be held responsible if
any security risk affects service to its clients
infrastructure cloud provider offers many services,
that can benefit our clients, such as quick access to
their data from any location, scale, pay-to-use,
data storage, data recovery, protection from hackers
on-demand security management, and network usage
and infrastructure .
Security risks in Cloud Computing
While cloud services providers can offer benefits
for users, the security risks have played an important role in the cloud
Computing environment . Users online data
sharing or networking equipment are aware of the potential
the loss of personal life . According to a recent survey by IDC
, the top problem for 74% of it directors in connection with the
cloud computing is security. The protection of private and
important information such as credit card details or
medical records of patients of the attackers or malicious
Insiders is critical . moving
Database for large data center includes many security
Tasks such as virtualization, vulnerability
availability of vulnerability, privacy and control issues
This was accessed by a third party, integrity,
Privacy and data loss or theft.