The name comes from the use of clouds as an abstraction for the complex infrastructure it contains in system diagrams (Gruman, 2008). Cloud computing entrusts services with a user's data, software and computation over a network. Cloud computing can be public or private or hybrid. In public cloud, applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model.
Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered). Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally (Ryan, 2011). Undertaking a private cloud project requires a significa
...nt level and degree of engagement to virtualize the business environment, and it will require the organization to reevaluate decisions about existing resources.
When it is done right, it can have a positive impact on a business, but every one of the steps in the project raises security issues that must be addressed in order to avoid serious vulnerabilities. While Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models (Ryan, 2011). As cloud computing is achieving increased popularity, also is the security security issues increasing. 1. 1 Background of study
In just a few years, cloud computing platforms and services have dramatically changed the landscape of software application development. (Voorsluys, etal 2011) The emergence of the Cloud
system has simplified the deployment of large-scale distributed systems for software vendors. The Cloud system provides a simple and unified interface between vendor and user, allowing vendors to focus more on the software itself rather than the underlying framework. Applications on the Cloud include Software as a Service system and Multi-tenant databases.
The Cloud system dynamically allocates computational resources in response to customers’ resource reservation requests and in accordance with customers’ predesigned quality of service ( Armbrust, etal 2010). Conceptually, cloud computing makes sense: business managers love the return on investment, and developers love the freedom from infrastructure code. But many shops still are struggling with whether or not to move to cloud platforms. (Patterson,2010). Data security is one of the main concerns for an organization considering migrating its software to a cloud infrastructure.
The more sensitive the data is, the more reason there is for concern. Cloud computing doesn't exactly introduce new data security concerns; in most cases, it just amplifies them. Putting data in the cloud(whether private or public cloud) potentially exposes it to a larger audience, which is usually a good thing. But if the data exposed is meant to be private, or only conditionally accessed, then the results could be catastrophic. The fundamental issue with cloud computing is that it removes entrusted data from a developer or sys-admin's immediate control.
Rather than being stored and managed locally, data in the cloud is stored on distributed devices that could be located anywhere, and conceivably accessed by anyone. (Baburajan, 2010). Risk coming with opportunity, the problem of data security in Cloud computing become bottleneck of cloud computing. As software developers,
it's important that we understand both the real security risks of cloud computing and the realistic approaches to solving at least some of these concerns. 1. 2 Statement of problem
This project work was inspired by the issues of data security in cloud computing which have been the main concerns for an organization considering migrating its software to a cloud infrastructure. 1. 3 Objective of the Study This Project work is aimed at achieving the following. 1. Design application that will authenticate users in private cloud computing system 2. Design an application that will be use in encrypting file that could be stored in private cloud environment. 1. 4 Significance of the Study
This research will help convince many organizations to consider migrating their software to a cloud infrastructure and enjoy the advantage of cloud computing. 1. 5 Scope of the Study The work covers file and database data encryption in private cloud computing. 1. 6 Limitations of the Study The following are constraint that affected us; There is limitation to resources for the research work; * Regular power failure; 1. 7 Definition of Terms Cloud computing: It simply means storing “stuffs” in the cloud.
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing entrusts services with a user's data, software and computation over a network. In other words, Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system
diagrams.
Cloud: the term cloud refers to servers on the internet. Client–server computing: This refers broadly to any distributed application that distinguishes between service providers (servers) and service requesters (clients). Cloud environment: Cloud environment is a dynamic environment, where the user's data transmits from the data centre to the user's client Encryption: Encryption is the process of transforming plain, human-readable text into unreadable text.
Secure Cloud computing: Secure Cloud computing enables organizations to effectively respond to changing business requirements without increasing the risk of data theft or loss. Virtual Machine technology: This is a technology that allows the operation of the server which is not dependent on the physical device, but on the virtual servers. In virtual machine or servers, a physical change or migration does not affect the services provided by the service provider.
- Computer File essays
- Desktop Computer essays
- Servers essays
- Cloud Computing essays
- Computer Science essays
- Consumer Electronics essays
- Data Analysis essays
- Electronics essays
- engineering essays
- Enterprise Technology essays
- Hardware essays
- Impact of Technology essays
- Information Age essays
- Information Technology essays
- Modern Technology essays
- Operating Systems essays
- people search essays
- Robot essays
- Camera essays
- Cell Phones essays
- Computer essays
- Ipod essays
- Smartphone essays
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays
- Automobile essays
- Bus essays
- Civil engineering essays
- Cycling essays
- Electric Car essays
- Genetic Engineering essays
- Hybrid essays
- Innovation essays
- Internal Combustion Engine essays
- Invention essays
- Mechanical Engineering essays