|
END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING ENVIRONMENTS
|
END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING ENVIRONMENTS Alargam Elrayah Elsayed Ali, Prof. Dr. Abdul Hanan Abdullah Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia [email protected], [email protected] ABSTRACT Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources, it has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, many of companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. A major concern in cloud computing adoption is security; however, basic network security is flawed at best. Even with modern protocols, hackers and worms can attack a system and create havoc within a few hours. Within a cloud computing, the prospects for incursion are many and the rewards are rich. Architectures and applications must be protected and security must be appropriate, emergent and adaptive. There are a lot of companies providing cloud computing services and all of them have security techniques to provide secure services to their customers and to solve the current cloud computing security issues, but still the problem that each one of those services providers have his own security architecture, policies and techniques which means that there is no one endto- end security architecture provided as standard solution for the cloud computing security issues. This research focuses on providing a concrete and orchestrate solution for security in cloud computing and providing an end-to-end security architecture to help in securing the cloud computing users’ information and privacy, and also preventing and protecting the ongoing attacks and threads from attacking or destroying the cloud computing user’s information. KEYWORD Secure cloud computing, Cloud computing Security, Secure computation, End-to- End security.
|
|
|
|
|
|