3. Introduction
Cloud computing is the business model of
distributed computing and is considered the
next generation of computing and storage
platforms.
Cloud computing requires an extension of the
architecture of distributed and parallel
systems by using virtualization techniques
Key to this extensible architecture is to
support properties such as compute on-
demand and pay-as-you-go model.
3
4. 4
Cloud Computing
”Cloud computing is a model for enabling
convenient, on-demand network access to a
shared pool of configurable computing
resources that can be rapidly provisioned and
released with minimal management effort or
service provider interaction.”
6. 6
Essential Characteristics
On-demand service
Get computing capabilities as needed
automatically
Broad Network Access
Services available over the net using desktop,
laptop, PDA, mobile phone
Resource pooling
Rapid Elasticity
Ability to quickly scale in/out service
Measured service
control, optimize services based on metering
8. 8
Deployment Models
Public
Cloud infrastructure is available to the general
public
Private
Cloud infrastructure for single organization only
Community
Cloud infrastructure shared by several
organizations that have shared concerns
Hybrid
Combination of above models
9. 9
Cloud Security
The key barrier to widespread uptake of
cloud computing is the lack of trust in clouds
by potential customers.
The cloud acts as a big black box, nothing
inside the cloud is visible to the clients
Data leakages out of cloud computing
environments are fundamental cloud security
concerns for both
The end-users and
The cloud service providers
10. Top threats to cloud computing
1. Abuse and wicked use of cloud computing
2. Insecure application programming interfaces
3. Malicious insiders
4. Shared technology vulnerabilities
5. Data loss or leakages
6. Account, service and traffic hijacking
7. Unknown risk profile.
10
11. 11
Provenance in Cloud
Provenance- to record ownership and process
history of data objects in cloud in order for
wide acceptance to the public.
Given its provenance, a data object can
report who created and who modified its
contents.
Secure provenance is vital to the success of
data forensics in cloud computing.
12. Data Provenance
The provenance of a data product mainly
consists of two parts
the ancestral data products from which the
data product is derived
And the process of transformation of these
ancestors that derive the data product
Provenance is an important aspect in the
verification, audit trails, reproducibility,
privacy and security, trust, and reliability in
distributed computing.
12
13. Conclusion
Data leakage is the main concern in cloud.
Data in the cloud should be secure.
Provenance increases the value of data on
the cloud.
Establishing trustworthy cloud computing
provenance is fundamental requirement to
establish cloud trust models.
13
14. REFERENCES
[1]. Kiran-Kumar Muniswamy-Reddy and
MargoSeltzer, “Provenance as First Class
Cloud Data” , Harvard School of Engineering
and Applied Sciences
[2]. Muhammad imran,Helmut hlavacs,
“Provenance Framework for the Cloud
Infrastructure:Why and How?” , University of
Vienna, Austria
[3]. Ryan Ko , Peter Jagadpramana, Miranda
Mowbray, Siani Pearson, “TrustCloud: A
Framework for Accountability and Trust in
CloudComputing” , Cloud & Security Lab
Hewlett-Packard Laboratories 14