Cloud computing provides data storage and access to web applications from remote servers. It addresses previous issues with data recovery, security, accessibility and more. The document discusses cloud computing benefits like cost savings, mobility and unlimited storage. Potential limitations include network dependency, limited features, technical issues and security attacks. It outlines security challenges involving confidentiality, integrity and availability, and proposes solutions like encryption and segregating data through algorithms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
54 views22 pages
Operating Systems Overview
Cloud computing provides data storage and access to web applications from remote servers. It addresses previous issues with data recovery, security, accessibility and more. The document discusses cloud computing benefits like cost savings, mobility and unlimited storage. Potential limitations include network dependency, limited features, technical issues and security attacks. It outlines security challenges involving confidentiality, integrity and availability, and proposes solutions like encryption and segregating data through algorithms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22
Libyan International Medical University
Faculty of Information Technology
An Overview of Cloud Computing
By: Maryam Farkash 1734
Abstract:
A cloud operating system is a lightweight operating
system that stores data and can access Web-based applications from a remote server.
This poster gives an overview of the Cloud Computing,
including security attacks and challenges that might be a risk against our personal information and their solutions as well. Introduction:
The operating system is the most important software. It
works as an interface between the hardware and the user. The basic functionalities of the operating systems are:
Resource management: managers that organize and allocate
resources (which can be an equipment or materials..) to ensure efficiency. Introduction (cont’d):
Process scheduling: is an OS task that schedules processes
of different states like ready, waiting and running. The great purpose of process scheduling is that it keeps the CPU busy all the time.
Event handling: is a mechanism that controls an event &
decides what should happen if an event occurs. Introduction:
The issue under study: before “cloud” approach there were
some issues that people didn’t know how to avoid them:
Recovery and backup issues, security Issues, transfer of
data, accessibility, power consumption and storage management. Background:
The idea of cloud computing moved ahead ascendingly, with
major advancement in the mid-1960s, an American computer scientist named John McCarthy came up with an idea for an interconnected system of computers, making it easier for people to access their files and data.
The term “Cloud” is originated from the telecommunications
world, where some telecom companies started offering Virtual Private Network (VPN) services with the highest quality of services at a much lower cost. Cloud Computing Benefits:
Cost saving: Rather than purchasing expensive systems and
equipment for your business, you can reduce your costs by using the resources of your cloud computing service provider.
Mobility: Employees who are working at remote locations
can easily access all could services. All they need is an Internet connectivity. Cloud Computing Benefits (Cont’d):
Unlimited storage capacity: At any time you can expand your
storage capacity with monthly fees.
Back-up and restore data: Once the data is stored in a Cloud,
it is easier to get the back-up and recovery Cloud Computing Limitations:
Network Connection Dependency: your business must always
have an internet connection.
Limited Features: When you use cloud computing for storage
and backup, you should be working with a provider who offers the value of unlimited bandwidth. You may experience limited storage space or accessibility.
Technical Issues: You have no choice but to call your provider’s
technical support for help. You can’t fix your cloud computing problems at home. Cloud Computing Limitations (cont’d):
Performance Instability: happens because of high load. The
expected behavior cannot be predicted as the cloud resources are shared among different users with variable process load.
Security Attacks: The main challenge of the cloud computing
users is the security of the information stored or transmitted to/from the cloud. Some of these attacks are SQL injection, malicious insider attack and denial of service attacks (DoS). Cloud Computing Limitations (cont’d):
SQL Injection: is a code injection technique which is
written in a form of SQL statements to attack data-driven applications.
Malicious Insider Attack: An employee that removes
information from the organization for his personal gain or to damage the organization.
Denial of service attacks (DoS): is an attack meant to shut
down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. Data Security Challenges:
In the Cloud Operating Systems, it requires great focus on
Data Security and Privacy.
Data loss or Data leakage can cause severe impact on any
business, brand or the trust of an organization. Data Security Challenges (cont’d):
* The three main areas in data security are:
A. Confidentiality: ensure that data is protected from any
attacks.
B. Integrity: users should not store their personal data such
as passwords so that integrity can be assured.
C. Availability: It depends on the agreement between vendor
and the client. Data Security Challenges (cont’d):
Segregation: injecting a client code or by using any
application, data can be intruded. So it is necessary to store data separately from the remaining customer’s data. Vulnerabilities with data segregation can be detected or found out using the tests such as Data validation.
Data Locality: In cloud computing, the data is distributed over
the number of regions and to find the location of data is difficult. Customers should know their data location and it is to be intimated by the service provider. Data Security Challenges (cont’d):
Access: The employees will be given access to the section of
data based on their company security policies. The same data cannot be accessed by the other employees. Encryption techniques are used to make data shared with the valid users.
Storage: The data stored in virtual machines have many
issues one such issue is reliability of data storage. Solutions to Data Security Challenges:
Encryption is suggested as a better solution to secure
information. Before storing data in cloud server it is better to encrypt data.
Many algorithms such as RSA (Rivest–Shamir–Adleman),
which is an algorithm used by modern computers to encrypt and decrypt messages.
SaaS (Software as a Service) is an algorithm which ensures
that there must be clear boundaries both at the physical and application level to segregate data from different users. Conclusion:
Cloud computing is the new emerging technology that
presents a good number of benefits to the users. The idea of Cloud is to save a lot of time and money and to facilitate data accessibility. It faces a lot of security challenges. And the best solution for these challenges is to use data encryption; (RSA and SaaS algorithms) References:
(Turab, Taleb, & Masadeh, 2013)Turab, N. M., Taleb, A. A., &
Masadeh, S. R. (2013). Cloud Computing Challenges And Solutions. International Journal of Computer Networks & Communications, 5(5), 209–216.
(Bairagi & Bang, 2018)Bairagi, S. I., & Bang, A. O. (2018).