Cloud computing is clearly one of today’s most enticing technology areas due, at
least in part, to its cost-efficiency and flexibility. However, despite the surge in
activity and interest, there are significant, persistent concerns about cloud
computing that are impeding momentum and will eventually compromise the
vision of cloud computing as a new IT procurement model. In this paper, we
characterize the problems and their impact on adoption. In addition, and equally
importantly, we describe how the combination of existing research thrusts has the
potential to alleviate many of the concerns impeding adoption. In particular, we
argue that with continued research advances in trusted
computing and computation-supporting encryption, life in the cloud can be
advantageous from a business intelligence standpoint over the isolated alternative
that is more common today.
Cloud computing is the most popular notion in IT today; even an academic report
[6] from UC Berkeley says “Cloud Computing is likely to have the same impact on
software that foundries have had on the hardware industry.” They go on to
recommend that “developers would be wise to design their next generation of
systems to be deployed into Cloud Computing”. While many of the predictions
may be cloud hype, we believe the new IT procurement model offered by cloud
computing is here to stay. Whether adoption becomes as prevalent and deep as
some forecast will depend largely on overcoming fears of the cloud.Cloud fears
largely stem from the perceived loss of control of sensitive data. Current control
measures do not adequately address cloud computing’s third-party data storage and
processing needs. In our vision, we proposeto extend control measures from the
enterprise into the cloud through the use of Trusted Computing and applied
cryptographic techniques. These measures should alleviate much of today’s fear of
cloud computing, and, we believe, have the potential to provide demonstrable
business intelligence advantages to cloud participation.Our vision also
relates to likely problems and abuses arising from a greater reliance on
cloud computing, and how to maintain security in the face of such
attacks. Namely, the new threats require new constructions to maintain
and improve security. Among these are tools to control and understand
privacy leaks, perform authentication, and guarantee availability in the
face of cloud denial-of-service attacks.

More Related Content

PPTX
Encryption Algorithms for Cloud
PPTX
Good research paper
PDF
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
PDF
A Third Party Auditor Based Technique for Cloud Security
PDF
Expert predictions for cloud 2018
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
PDF
Toward a global data infrastructure
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Encryption Algorithms for Cloud
Good research paper
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
A Third Party Auditor Based Technique for Cloud Security
Expert predictions for cloud 2018
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Toward a global data infrastructure
International Journal on Cloud Computing: Services and Architecture (IJCCSA)

What's hot (19)

PPTX
Hakfest2015-Tunisia
PPTX
Cloud computing
PPTX
SMAC
PDF
The benefits of cloud computing
PPTX
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
PDF
MSPs: Give customers the cloud (without letting them float away)
PPTX
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
PDF
Next Generation Managed Services KOX
PDF
Data Science, Knowledge Discover, Mining and Learning
PPT
Why software matters
PDF
Cisco 2013 Annual Security Report
PPTX
Big Data in an modern Enterprise
PDF
Machine Learning and Internet-of-Things: opposites attract in the age of data...
PDF
Vps server 3
PDF
Meet Secure Messaging
PPT
Security Problem With Cloud Computing
PPT
Security Problem With Cloud Computing
Hakfest2015-Tunisia
Cloud computing
SMAC
The benefits of cloud computing
Creating and Managing a Private or Hybrid Cloud: A Strategy Session
MSPs: Give customers the cloud (without letting them float away)
VMworld vBrownBag vmtn5534e - placement of iot workload operations within a c...
Next Generation Managed Services KOX
Data Science, Knowledge Discover, Mining and Learning
Why software matters
Cisco 2013 Annual Security Report
Big Data in an modern Enterprise
Machine Learning and Internet-of-Things: opposites attract in the age of data...
Vps server 3
Meet Secure Messaging
Security Problem With Cloud Computing
Security Problem With Cloud Computing
Ad

Similar to Cloud computing (20)

DOCX
Cloud Computing Adoption and the Impact of Information Security
DOCX
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
PPTX
Introduction-to-basics of Cloud-Computing.pptx
DOCX
Challenges faced in cloud
PDF
Outsourcing control
PDF
B018211016
PPTX
Importance-of-Cloud-Computing.pptx
DOCX
Unraveling the Mysteries of Cloud Computing: A Comprehensive Guide
PDF
B1802041217
PDF
Effects of Security and Privacy Concerns on using of Cloud Services in Energy...
DOCX
Review of Business Information Systems – Fourth Quarter 2013 V.docx
PDF
An Analysis of the Existing Frameworks in Cloud Computing Adoption and Introd...
DOCX
Cloud Computing 2.0
PDF
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
PDF
How will cloud computing transform technology
PPTX
Scope-of-Cloud-Computing.pptx
PDF
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
PDF
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
PDF
Ad4502189193
Cloud Computing Adoption and the Impact of Information Security
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Introduction-to-basics of Cloud-Computing.pptx
Challenges faced in cloud
Outsourcing control
B018211016
Importance-of-Cloud-Computing.pptx
Unraveling the Mysteries of Cloud Computing: A Comprehensive Guide
B1802041217
Effects of Security and Privacy Concerns on using of Cloud Services in Energy...
Review of Business Information Systems – Fourth Quarter 2013 V.docx
An Analysis of the Existing Frameworks in Cloud Computing Adoption and Introd...
Cloud Computing 2.0
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
How will cloud computing transform technology
Scope-of-Cloud-Computing.pptx
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checki...
Ad4502189193
Ad

Recently uploaded (20)

PPTX
mechattonicsand iotwith sensor and actuator
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Principal presentation for NAAC (1).pptx
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Introduction to Power System StabilityPS
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Measurement Uncertainty and Measurement System analysis
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
Unit1 - AIML Chapter 1 concept and ethics
mechattonicsand iotwith sensor and actuator
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Amdahl’s law is explained in the above power point presentations
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
20250617 - IR - Global Guide for HR - 51 pages.pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Module 8- Technological and Communication Skills.pptx
Principal presentation for NAAC (1).pptx
Information Storage and Retrieval Techniques Unit III
Introduction to Power System StabilityPS
Computer System Architecture 3rd Edition-M Morris Mano.pdf
August -2025_Top10 Read_Articles_ijait.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Measurement Uncertainty and Measurement System analysis
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Unit1 - AIML Chapter 1 concept and ethics

Cloud computing

  • 1. Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. In this paper, we characterize the problems and their impact on adoption. In addition, and equally importantly, we describe how the combination of existing research thrusts has the potential to alleviate many of the concerns impeding adoption. In particular, we argue that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today. Cloud computing is the most popular notion in IT today; even an academic report [6] from UC Berkeley says “Cloud Computing is likely to have the same impact on software that foundries have had on the hardware industry.” They go on to recommend that “developers would be wise to design their next generation of systems to be deployed into Cloud Computing”. While many of the predictions may be cloud hype, we believe the new IT procurement model offered by cloud computing is here to stay. Whether adoption becomes as prevalent and deep as some forecast will depend largely on overcoming fears of the cloud.Cloud fears largely stem from the perceived loss of control of sensitive data. Current control measures do not adequately address cloud computing’s third-party data storage and processing needs. In our vision, we proposeto extend control measures from the enterprise into the cloud through the use of Trusted Computing and applied cryptographic techniques. These measures should alleviate much of today’s fear of cloud computing, and, we believe, have the potential to provide demonstrable business intelligence advantages to cloud participation.Our vision also relates to likely problems and abuses arising from a greater reliance on cloud computing, and how to maintain security in the face of such attacks. Namely, the new threats require new constructions to maintain and improve security. Among these are tools to control and understand privacy leaks, perform authentication, and guarantee availability in the face of cloud denial-of-service attacks.