Cloud Computing Review - Concepts, Te PDF
Cloud Computing Review - Concepts, Te PDF
1, 2017
Mahantesh N. Birje*
Center for Post Graduate Studies,
VTU, Belagavi, Karnataka, India
Email: [email protected]
*Corresponding author
Praveen S. Challagidad
Department of CSE,
Basaveshwar Engineering College,
Bagalkot, Karnataka, India
Email: [email protected]
R.H. Goudar
Center for Post Graduate Studies,
VTU, Belagavi, Karnataka, India
Email: [email protected]
Manisha T. Tapale
Department of CSE,
KLE Dr. MSSCET,
Belagavi, India
Email: [email protected]
1 Introduction
The term ‘cloud’ was coined from the computer network diagrams which use it to hide
the complexity of infrastructure involved. Cloud computing is gaining a great scope
towards IT industries, academics and individual users because of its ease of use,
on-demand access to network resources, minimal management effort and reduced cost
(Rajnish, 2011). The National Institute of Standards and Technology (NIST, 2014)
defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand
34 M.N. Birje et al.
Cloud Perspective
With all of the potential gains and limitations, security is considered as one of the major
critical challenges in cloud computing because of shared nature of cloud ecosystem. For
example, data in cloud is stored remotely, totally out of the control of the data owner.
Actually, security can be an obstacle towards implementation of cloud computing in
enterprises, because of the great deal of uncertainty about how security at all levels can
be achieved (Ma, 2012). In cloud ecosystem, users lose the control over physical security
(Rittinghouse and Ransome, 2010), because users may have to share and store computing
resources on cloud servers. Unfortunately these servers are controlled and owned by
CSPs. It could be possible that CSPs may themselves modify the user’s data. It is also
possible for a user’s data to be exposed to another user without their knowledge and
control. The cloud computing system is based on the trust, what makes security and
confidentiality the major issue. Hence security becomes critical issue in cloud computing.
This challenge is affecting the widespread adoption of cloud computing. Therefore it is
discussed separately in detail.
The remainder of this paper is organised as follows: Section 2 presents cloud
perspective in terms of history, concepts, technology and challenges. Sub-section 2.1
describes how cloud is entered into the market; Sub-section 2.2 describes cloud concepts;
Sub-section 2.3 describes the technology in terms of architectural features and tools; and
Sub-section 2.4 discusses various challenges in cloud. Section 3 describes security in
cloud computing paradigm. Sub-section 3.1 describes security objectives; Sub-section 3.2
describes security issue and its countermeasures. Conclusions and future directions are
presented at the end.
2 Cloud perspective
The cloud paradigm can be viewed in different perspectives depending on how the user
wants to perceive cloud technology. The paper perceives and describes the cloud
technology in terms of its history, concepts, technology and challenges of a cloud
computing.
2.1 History
Table 1 describes how cloud is entered into the market from the past (Bashe, 1986; Tim,
1989; Bennett et al., 2000; Freiberger and Michael, 2000; Finch, 2006). Though it took
some time to agree and start using the cloud technology, many IT companies have come
forward to offer various types of cloud services.
Table 1 Cloud retrospective
Year Description
2000–2005 Dot.com bubble burst leads to introduction of cloud.
2006 Amazon enters the cloud market.
2007–2008 The market disagree on the understanding of cloud.
2008 Cloud market expands as more vendors join.
2008–2009 IT attention shift to emerging private cloud.
36 M.N. Birje et al.
Year Description
2009–2010 The open source cloud movement takes hold, example Openstack.
2009–2011 Cloud computing finds its way, become popular, every organisation started
and 2012 implementing cloud platform. In the year 2011, a new deployment model called
hybrid cloud born.
2012–2013 The Australian Bureau of Statistics (ABS) 2013–14 Business Characteristics
and 2014 Survey (BCS) showed that one in five businesses had been using some form of
paid cloud computing service. The overall results showed that between 2012–13
and 2013–14, businesses using information technology increased. When
examining the areas where businesses used IT to a high extent, 60% used it for
accounting, and 55% used it for invoicing business processes (http://www.zdnet
website, ABS article, online, 24 September 2015).
2014–2015 Many IT companies moving towards adoption of cloud technology because of its
effectiveness and fast growth.
2.2 Concepts
Cloud computing is a delivery of extremely scalable IT related facilities as a service
through the internet to multiple clients. Clients can have a choice of different cloud
service models based on his/her requirements (Edwards, 2012). It involves many services
to clients generally called as XaaS, where X stands for any kind of service like hardware,
software, platform, infrastructure, data and business etc. that the cloud offers to clients.
Basically, X involves three kinds of services which are widely used such as SaaS, PaaS
and IaaS.
This section describes cloud constituents such as three service models and four
deployment models. The three service models are briefly explained below:
Platform
SaaS Cloud
SP
SP
PaaS Cloud
IaaS Cloud
The four deployment models of cloud computing are almost the same except their scope
and accessibility given to the cloud users. Figure 3 depicts cloud deployment models and
their features. These models are briefly explained below:
1 Public cloud/external cloud
This cloud allows cloud environment as openly accessible to all users. Public cloud
is off premise in which various enterprises can be used to deliver the services to
users by taking it from the third party. Examples: Sun Cloud, Google AppEngine,
IBM’s Blue Cloud, Amazon Elastic Compute Cloud (EC2), and Windows Azure
Service Platform.
2 Private cloud/internal cloud
This cloud referred to on-premise cloud used to provide the high level control over
cloud services and infrastructure which is controlled or owned by an organisation. It
is built specifically to provide the services within an organisation for maintaining the
security and privacy. Examples: Seagate and RedHat.com etc.
38 M.N. Birje et al.
Hybrid Cloud:
xCombines Private, Public or
Community Clouds.
xAllows manipulation of CapEX
Private Cloud: and OpEX to reduce costs. Public Cloud:
xLeverages xSupports resource Portability. xShifts CapEx
existing
to OpEx
CapEx.
xOffers pay as
xCan Helps to
you grow.
reduce OpEx.
Community Cloud: xSupports
xIntended for
xAllows sharing of CapEx multiple
single tenant
and OpEx to reduce costs. tenants.
xBridges together groups or
organisations with
common goal.
xSupports reduce
portability.
2.3 Technology
This section describes various cloud platforms based on their features, and also various
tools that are available in the market.
Platforms
Features
AWS IBM Blue Cloud Microsoft Azure GAE
SLA (Alexander AWS as SOA-based web SOA-based web Yes
2009) service service service
interface
Reliability Highly reliable Reliable Azure Fabric Sandbox
(Pol, 2009; IBM
Introduces
Ready-to-Use
Cloud Computing,
2014; Charlie and
Ramanathan, 2010;
Rajkumar et al.,
2011)
Auto-scaling Cloud Watch Maximum Azure fabric Memcache
Elasticity (Martijn, Elastic Load No Yes, as per AppLoad
2012) Balancing service usage Balancer
Service
Virtualisation (Bala VPC Xen and VM role runs an Guest VMs
and Girish, 2012) Power VM image VHD
Availability zone Yes, separate Yes, separate Yes, separate Yes, separate
(Jinesh, 2011) zone is present zone is not zone is not zone is not
present present present
Privacy VPC uses Yes AppFabric and App controller
IPSec Tunnel Geneva
mode framework
Storage Elastic Block SVC cluster Sql Azure Google APIs
(David et al., 2010; Storage (EBS) (IBM Total Storage connect open
Dong and Hui, and Simple Storage San databases, store
2010) Storage Volume data sync
Service (S3) Controller) and
XIV Nextra
Security AWS Identity Blue Gene Yes App controller
and Access Supercomputer,
Management System Z Parallel
Sysplex
2.3.2 Tools
Tools provide environment and platform for developing various cloud services,
implementing their own algorithms and mechanisms. Various tools that are available in
the market for implementing cloud computing technology are discussed here. Cloud tools
are categorised into open source tools and commercial tools.
40 M.N. Birje et al.
• Scalr: Scalr is the best fit for those looking to explore the platform and to build
and test their projects on their own. It delivers self-service access to cloud
infrastructure and acts as an intermediary management layer between cloud
infrastructure and engineering, and provides the ownership of information security
back to IT department hands. Scalr enforces cloud infrastructure security such as
governance and compliance to create and enforce policies on the basis of budgets,
configurations, and user access across entire cloud portfolio. Network policy
enforcement allows securing cloud infrastructure by regulating the use of networks.
Enabling to deliver single sign-on (SSO) across private and public clouds is achieved
through authentication and authorisation techniques (Scalr, 2012).
Challenges
Confidentiality
Integrity Data Centres Network Common Challenges
Availability
Authentication
Accountability Countermeasures
3 Security
In a cloud, responsibility for employing and preserving efficient security mechanisms are
in the hands of the providers. To reduce their customer’s panic of the cloud, these
providers want to convince them that their data and applications will be accurately
secured (Bernsmed et al., 2012). Security is considered to be a dangerous obstacle for
cloud computing in its lane to success (Bhaskar et al., 2009), and hence it is a major
challenge. This section discusses security objectives and issues.
These five objectives represent the basic security objectives for data, information and
computing services (William, 2010).
• Confidentiality: It is used to preserve authorised limitations on accessing information
and disclosure, including means for protecting personal privacy and proprietary
information. It has two types:
1 data confidentiality: it assures that private or sensitive information is made
unavailable or disclosed to illegal persons
2 privacy: it assures that persons control or influence what information feel right
to them is collected and stored and by whom and to whom that information is
disclosed.
• Integrity: Protecting against inappropriate information destruction or modification,
including ensuring information non-repudiation and authenticity. It has two types:
1 data integrity: it assures that information and programs are altered only a
specified and authorised manner
2 system integrity: it assures that a system makes its intended function in
superior way, free from inadvertent or deliberate illegal handling of the
system.
• Availability: Ensuring reliable and timely access to and use of information.
• Authenticity: Assurance that a message, transaction, or additional exchange of
information is from the source it claims to be from. It entails evidence of
identity.
• Accountability: The security goal is that creates the requisite for actions of an entity
to be traced uniquely to that entity.
These technical and legal plan related security issues lead to decrease in the
confidence of cloud technology adoption. Similarly security issues related to the location
of data centre, network and other common issues also hinder the growth of cloud
technology adoption. These issues are depicted in Figure 5. Description of various issues
related to the location of data centre, network and other common issues are described in
Table 5, Table 6 and Table 7 respectively.
3.2.2 Networks
Table 6 discusses the security issues related to networks along with their possible
countermeasures. In this table, the countermeasures for the every issue has been
discussed but there is need for more efficient algorithms and techniques in issues such as
SQL injection attacks, Google hacking, sniffer attacks, cookie poisoning and CAPTCHA
splitting.
This paper reviewed cloud computing paradigm in terms of various perspectives such as
concepts, cloud platforms, tools, and challenges. The history of cloud computing
evolution is presented in Sub-section 2.1. Three service models (SaaS, PaaS and IaaS)
and four deployment models (private, public, hybrid and community cloud) are described
in Sub-section 2.2. Description of cloud platforms by different CSPs (Amazon, IBM,
Microsoft, Google) are discussed in Sub-section 2.3; it also discussed open source tools
(Open Nebula, Apache CloudStack, Nimbus and Eucalyptus) and commercial tools
(RightScale, Gravitant, VMTurbo and Scalr). Various general challenges of cloud
computing and the number of difficulties involved in those challenges are identified and
the possible solutions are presented in Sub-section 2.4. These solutions would help the
researchers to have proper directions for future research and to get into the efficient
implementation of the techniques. Security objectives and security issues related to
the location of data centres, network and other common issues are discussed in
Sub-sections 3.1 and 3.2 respectively. There is a need of designing efficient solutions
to address security issues such as data transfer across gateway, long-term viability,
compromised services, regulatory compliance, virtualisation in cloud computing
paradigm.
We believe this paper helps researchers who would like to begin their research career
in the area of cloud computing.
References
Abdul, W.K. et al. (2012) ‘A literature survey on data privacy/protection issues and challenges in
cloud computing’, IOSR Journal of Computer Engineering (IOSRJCE), Vol. 1, No. 3,
pp.28–36.
Alexander, Z. (2009) ‘Google App Engine’, Seminar on Internetworking, from Google website,
[online] http://www.cse.hut.fi/en/publications/B/5/papers/1Zahariev_final.pdf (accessed 21
January 2014).
Aman, B. and Yogesh, B.D. (2010) ‘Securing cloud from DDoS attacks using intrusion
detection system in virtual machine’, Proceeding of the Second International Conference on
Communication Software and Networks (ICCSN’10), pp.260–264.
Apache Cloud Stack (2015) World Wide Web Consortium [online] https://www.cloudstack.apache.
org/docs/ (accessed 23 January 2014).
Arshad, J., Townend, P. and Xu, J. (2009) ‘Quantification of security for compute intensive
workloads in clouds’, 15th International Conference on Parallel and Distributed Systems,
School of Computation, pp.478–486.
Bala, P.P. and Girish, P. (2012) Windows Azure – The Cloud Computing Platform, White Paper,
Tata Consultancy Services.
Bashe, C.J. (1986) IBM’s Early Computers, MIT Press Series in the History of Computing,
MIT Press, Cambridge, Mass [online] http://mitprss.mit.edu/books/ibms-early-c
(accessed November 19 2014).
Bennett, K., Layzell, P., Budgen, D. et al. (2000) ‘Service-based software: the future for flexible
software’, Seventh Asia-Pacific Software Engineering Conference (APSEC), Singapore.
Bernsmed, K. et al. (2012) ‘Thunder in the clouds: security challenges and solutions for federated
clouds’, 4th IEEE International Conference on Cloud Computing Technology and Science
Proceedings.
54 M.N. Birje et al.
Bhaskar, P., Rimal, E.C. and Ian, L. (2009) ‘A taxonomy and survey of cloud computing systems’,
Fifth International Joint Conference on INC, IMS and IDC, 978-0-7695-3769-6/.
Brian, A. (2013) RightScale Grid: Grid Computing Applications in the Cloud, Technical White
Paper, RightScale, Inc.
Castro, D. (2013) How Much Will PRISM Cost the U.S Cloud Computing Industry?, August 2013
[online] http://www2.itif.org/2013-cloud-computing-costs.pdf (accessed 21 January 2015).
Charlie, K. and Ramanathan, V. (2010) Windows Azure™ Security Overview, White technical
paper [online] http://www.research.ijcaonline.org/volume98/number1/pxc3897184.pdf
(accessed 12 March 2015).
Chen, Y., Paxson, V. and Katz, R.H. (2010) What’s New About Cloud Computing Security [online]
http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html (accessed 14 March
2015).
Claudio, M., Roberto, B. and Roberto, C. (2010) ‘Integrating a network IDS into an open source
cloud computing environment’, Sixth International Conference on Information Assurance and
Security, USA, pp.265–270.
Cloud Security Alliance (2013) Security Guidance for Critical Areas of Focus in Cloud Computing
V3.0 [online] https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (accessed 15
August 2014).
Daniel, N. and Rich, W. (2009) ‘Eucalyptus: an open source cloud computing infrastructure’, 9th
IEEE/ACM International symposium on Cluster Computing and the Grid.
David, C. et al. (2010) Introducing the Azure Services Platform, Sponsored by Microsoft
Corporation [online] http://www.ijcsit.com/docs/Volume%202/vol2issue2/ijcsit2011020205.
pdf (accessed 15 March 2015).
Descher, M., Masser, P., Feilhauer, T., Tjoa, A.M. and Huemer, D. (2009) ‘Retaining data control
to the client in infrastructure cloud’, International Conference on Availability, Reliability and
Security, pp.9–16, Dornbirn.
Dong, X. and Hui, L. (2010) ‘Reviewing some cloud computing platforms’, Proc. of Second
International Symposium on Networking and Network Security (ISNNS ‘10), Jinggangshan,
China.
Edwards, J.D. (2012) Choosing a Deployment Strategy that Fits, Oracle White Paper, Oracle JD
Edwards Cloud Computing.
Ennajjar, I., Tabbi, Y. and Benkadour, A. (2014) ‘Security in cloud computing approaches and
solutions’, 2014 Third IEEE International Colloquium in Information Science and Technology
(CIST), Tetouan.
Eucalyptus (2015) World Wide Web Consortium [online] http://www.eucalyptus.com/reference-
architecture/ (accessed 23 January 2015).
Finch, C. (2006) The Benefits of the Software-as-a-Service Model, Computer World Management
[online] http://www.computerworld.com/s/article/107276/The_Benefits_of_the_Software_as_
a_Service_Model (accessed 17 March 2015).
Flavio, L. and Roberto, D.P. (2011) ‘Secure virtualization for cloud computing’, Journal of
Network and Computer Applications, Vol. 34, No. 4, pp.1113–1122, Academic Press Ltd.,
London, UK.
Freiberger, P. and Michael, S. (2000) Fire in the Valley: The Making of the Personal Computer,
2nd ed., McGraw-Hill, New York.
Gellman, R. (2009) Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud
Computing [online] http://www.worldprivacyforum.org/.../wprivacyforum/.../WPF_Cloud_
Privacy (accessed 12 April 2015).
Gordon, R. and Richard, M. (2012) ‘Security issues of a publicly accessible cloud computing
infrastructure’, 2012 IEEE 11th International Conference on Trust, Security and Privacy in
Cloud Computing and Communications, Liverpool.
Cloud computing review: concepts, technology, challenges and security 55
Gravitant (2014) ‘The power to transform’, Transformational Cloud Services Brokage and
Management Empowering Enterprises to Optimize Cloud Consumption [online]
http://www.gravitant.com/hybrid-it-cloud-service-broker/.
Gundeep, S.B., Prashantkumar, S., Krishen, K.K. and Seema, K. (2012) ‘Cloud security: analysis
and risk management of VM images’, Proceeding of the IEEE International Conference on
Information and Automation Shenyang, China.
Gurudatt, K., Nikita, C., Ruchitra, C., Rani, W. and Rajnikant, P. (2012) ‘Cloud security
challenges’, 7th International Conference on Telecommunication Systems, Services, and
Applications [TSSA], 978-1-4673-4550-7/12/2012 IEEE.
IBM Introduces Ready-to-Use Cloud Computing (2014) [online]
http://phys.org/news114365558.html (accessed 23 November 2014).
Jenni, S.R. (2009) ‘A survey on virtual machine security’, Seminar of Network Security, Helsinki
University of Technology.
Jensen, M., Schwenk, J. and Gruschka, N.I. (2009) ‘On technical security issues in cloud’, IEEE
International Conference on Cloud Computing, Germany, pp.109–116.
Ji, H.K. (2009) ‘A Benchmark of transparent data encryption for migration of web application
in cloud’, Eighth IEEE International Conference on Dependable, Autonomic and Secure
Computing, Chengdu, pp.735–740.
Jinesh, V. (2011) Architecting for the Cloud: Best Practices, White paper, Amazon Web Service
[online] https://aws.amazon.com/blogs/aws/new-whitepaper-architecture-for-the-cloud-best-
practices/.
Joel, G., Darren, E., Robin, R. and Qing, T. (2012) ‘Benefits and challenges of three cloud
computing service models’, 2012 Fourth International Conference on Computational Aspects
of Social Networks [CASoN], 978-1-4673-4794-5/12/2012 IEEE.
John, E.D. (2009) Spammers Break Hotmail’s CAPTCHA Yet Again, Tech-world.
John, H., Lorti, M.K. and Bruce, P. (2009) Data Security in the World of Cloud Computing,
IEEE Security & Privacy, Co-published by the IEEE Computer and Reliability Societies,
Vol. 7, No. 4, pp.61–64.
Kevin, J. (2009) Secure Cloud Computing: An Architecture Ontology Approach [online]
http://sunset.usc.edu/gsaw/gsaw2009/s12b/jackson.pdf (accessed 12 February 2015).
Khan, A.W. et al. (2012) ‘A literature survey on data privacy protection issues and challenges in
cloud computing’, IOSR Journal of Computer Engineering (IOSRJCE), Vol. 1, No. 5, ISSN:
2278-0661.
Liu, A., Yuan, T. and Stavrou, A. (2009) SQLProb: A Proxybased Architecture towards Preventing
SQL Injection Attacks, 8–12 March, SAC, Honolulu, Hawaii, USA.
Ma, X. (2012) ‘Security concerns in cloud computing’, Fourth International Conference on
Computational and Information Science.
Macquarir University (2008) Guide to Implementation of Assessment Policies, September [online]
https://staff.mq.edu.au/public/download/?id=40234 (accessed 10 April 2015).
Martijn, Z. (2012) How to Optimize the Usability of Cloud Computing, Without Losing Control?,
Dutch Cloud B.V., Netherlands.
National Institute of Standards and Technology (NIST) (2014) Computer Security Resource Center
[online] http://www.csrc.nist.gov [online] (accessed 15 July 2014).
Neha, K. and Kumar, C. (2015) ‘Security in cloud: attacks & prevention techniques’, International
Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 5, No. 1, pp.85–88.
Nimbus (2015) World Wide Web Consortium [online] http://www.nimbusproject.org/ (accessed
23 January 2015).
Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L. and Zagorodnov, D.
(2009) ‘The Eucalyptus open-source cloud-computing system’, Proceedings of the 9th
IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID ‘09),
pp.124–131.
56 M.N. Birje et al.
Xiao, Z. and Xiao, Y. (2012) ‘Security and privacy in cloud computing’, IEEE Communications
Surveys & Tutorials, accepted for publication.
Yashpalsinh, J. and Kirit, M. (2012) ‘Cloud computing – concepts, architecture and challenges’,
2012 International Conference on Computing, Electronics and Electrical Technologies
[ICCEET], 978-1-4673-0210-4/12/2012.
Zhang, S., Chen, X., Zhang, S. and Huo, X. (2010) ‘Cloud computing research and development
trend’, Second International Conference on Future Networks, (ICFN 2010).
Zhou, M., Zhang, R., Xie, W., Qian, W. and Zhou, A. (2010) ‘Security and privacy in cloud
computing: a survey’, Sixth International Conference on Semantics Knowledge and Grid
(SKG), p.105.
Zouheir, T., Hamza, R., Kamel, K. and Mounir, F. (2004) ‘Malicious sniffing system detection
platform’, Proceedings of the International Symposium on Applications and the Internet
(SAINT’04), pp.201–207.