2015-01-17

Cloud Computing Security: from single to Multi-clouds

Abstract

The use of cloud computing is growing fast

in many organizations. Cloud Computing provides

many advantages in terms of low cost and availability

Data. Securing cloud computing

The main factor in the cloud, and

as users often store confidential information to the cloud

storage vendors, but the providers may be

confidence. Working with "a single cloud" providers

predicted to become less popular with clients due to

risks insufficient availability and services

Internal attacker in the same cloud.

the move toward "Multi-clouds", or, in other words,

"Interclouds" or "cloud of clouds" originated

in recent times.

introduction

The use of cloud computing has dramatically increased in the

many organizations. Subashini and by Kavitha on [49] claim

that small and medium-sized companies use cloud computing

services for a variety of reasons, including the fact that they

services give you quick access to your applications and

reduce your infrastructure costs.

Cloud providers should consult the privacy and

security issues as a priority and urgent priority.

Working with "a single cloud" providers becomes

less popular among customers because of the potential problems

such as the denial of access and opportunities

that is, malicious insiders in a single cloud. in

In recent years there has been a movement toward "multiclouds",

"Mežoblačnogo" or "cloud of clouds".

background

NIST [1] describes cloud computing as "model

enabling convenient, on-demand access to the network for

shared pool of configurable computing resources (e.g.,

networks, servers, storage, applications, and services)

that can be quickly released and initialized with the

minimum effort or service provider

interaction ".

Cloud computing Components

The cloud-computing model consists of five

characteristics of three delivery models, and four

deployment models [1]. Five key characteristics

cloud computing are: location independent resource

combining on-demand, self-service, rapid elasticity, wide

access to the network, and measured service [51]. These five

specifications represent the first layer in the cloud

environment architecture (see Figure 1).

Cloud service providers Examples

In the commercial world, diverse computing needs

are provided as a service. Service providers may

take care of the needs of the client, for example,

maintenance of the software or acquisition of expensive

equipment. For example, a service EC2 created

Amazon provides clients scalable servers. as

As another example, the Tooltip, NSF has joined

With Google and IBM to offer academic institutions

access to large-scale distributed infrastructure [4].

There are many opportunities of cloud computing. First,

Cloud storage, such as Amazon S3, Microsoft

SkyDrive or NirvanixCLoudNAS, give consumers

To access Internet data. Secondly, it provides an evaluation

resources for users such as Amazon EC2. Thirdly,

Google apps or version control repository for your source code

are examples of online collaboration tools [12].

Cloud providers must ensure security

the data of its customers and should be held responsible if

any security risk affects service to its clients

infrastructure cloud provider offers many services,

that can benefit our clients, such as quick access to

their data from any location, scale, pay-to-use,

data storage, data recovery, protection from hackers

on-demand security management, and network usage

and infrastructure .

Security risks in Cloud Computing

While cloud services providers can offer benefits

for users, the security risks have played an important role in the cloud

Computing environment . Users online data

sharing or networking equipment are aware of the potential

the loss of personal life . According to a recent survey by IDC

, the top problem for 74% of it directors in connection with the

cloud computing is security. The protection of private and

important information such as credit card details or

medical records of patients of the attackers or malicious

Insiders is critical . moving

Database for large data center includes many security

Tasks such as virtualization, vulnerability

availability of vulnerability, privacy and control issues

This was accessed by a third party, integrity,

Privacy and data loss or theft.

Show more