Cloud computing Its development and security

Main Article Content

J. Craig Mudge

Keywords

Cloud, computing, development, security

Abstract

Cloud computing is a mode of acquisition of infrastructure where a cloud service provides on demand computing and on-demand storage, accessible over the web, with a matching business model, namely pay-per-use. Lower cost, sometimes a factor of five, is achieved by automating operations in warehouse-sized data centres, sharing the hefty burden of cooling, physical security, and power backup, and the use of commodity components. As access to storage managed by cloud service providers gained market acceptance, the phrase “the cloud” came into use to refer to the location of information stored with a cloud service provider to be shared (business documents and photos) or copied for backup (against losing a phone or deleting information on a laptop).  Security, and to a lesser extent privacy, concerns are the major barriers to the adoption of cloud computing, but the leading cloud service providers have responded to the point that sensitive information, such as medical records and credit-card-holder data, is now held in the cloud. 

Downloads

Download data is not yet available.
Abstract 233 | PDF Downloads 20

References

Australian Government Information Security Manual (ISM). Defence Signals Directorate (DSD). Available from: http://www.dsd.gov.au/infosec/ism/
Amazon Web Services. AWS Security Center. Available from: https://aws.amazon.com/security/
ATSE. 2010. “Cloud computing: Opportunities and challenges for Australia”, J Craig Mudge, Principal Author. Report of a Study by the Australian Academy of Technological Sciences and Engineering (ATSE), 2010, ISBN 978 1 921388 15 6 Available from: http://www.atse.org.au/resource-centre/ATSE-Reports/Information-Technology/
CSIRO. 2013. Entering the App age. CSIRO Snapshot. Issue 22 / 1 May 2013
Dean, J. and Ghemawat, S. 2004. “MapReduce: Simplified Data Processing on Large Clusters”. Jeffrey Dean and Sanjay Ghemawat. OSDI ’04: 6th Symposium on Operating Systems Design and Implementation.
Defence Signals Directorate. “Cloud Computing Security Considerations”. Available from: http://www.dsd.gov.au/infosec/cloudsecurity.htm
European Network and Information Security Agency. Procure Secure. A guide to monitoring of security service levels in cloud contracts. Available from: www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/procure-secure-a-guide-to-monitoring-of-security-service-levels-in-cloud-contracts/at_download/fullReport
Google. Security and privacy overview. Google. Available from: http://support.google.com/a/bin/answer.py?hl=en&answer=60762
McAfee, A. and Brynjolfsson, E. 2012. “Big Data – the management revolution”, Harvard Business Review, Oct 2012
Mell, P. and Grance, T. 2011. The NIST Definition of Cloud Computing. National Institute of Standards and Technology. Gaithersburg, MD. September 2011. Available from: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
Microsoft, 2013. “Technical Overview of the Security Features in the Windows Azure Platform.” Available from: http://www.windowsazure.com/en-us/support/legal/security-overview/
National eResearch Collaboration Tools and Resources project (NeCTAR) . Available from: nectar.org.au/
NIST Guidelines on Security and Privacy in Public Cloud Computing (SP SP800-144)
Payment Card Industry Data Security Standard. Available from: https://www.pcisecuritystandards.org/security_standards/index.php