Cloud computing refers to computing resources and services that are provided over the internet. It allows users to access applications and store data on remote servers rather than local devices. There are different types of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Cloud computing can be deployed using public, private, community, or hybrid models depending on factors like security needs and resource sharing requirements. Many universities and organizations are conducting research on cloud computing technologies.
“The chapter is organized into two primary sections that explore cloud delivery model issues pertaining to cloud providers and cloud consumers respectively.”
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
“The chapter is organized into two primary sections that explore cloud delivery model issues pertaining to cloud providers and cloud consumers respectively.”
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud computing is basically storing and accessing data and sharing resources over the internet rather than having local servers or personal device to handle applications.
Short questions :
Q1: What are computer VIRUS, WORM and Trojan horse?
Q2: What network protocols are used in Cloud Computing?
Q3: What is DOS Attack?
Q4: What is resource management in cloud computing?
Q5: What is difference between HTTP and HTTPs?
Q6: What is scheduling in Cloud?
Q7: What is difference between authentication and authorization? Explain.
Q8: What is data encryption? Discuss some current techniques used for encryption.
Q9: What is SSL?
Q10: What is Identity Management System? How it is helpful in Cloud Computing?
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
It's a simple presentation I did it with my friend Khawlah Al-Mazyd last year as a one topic should we cover it through doing Advanced Network course.
2010 - King Saud Universty
Riyadh - Saudi Arabia
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud computing is basically storing and accessing data and sharing resources over the internet rather than having local servers or personal device to handle applications.
Short questions :
Q1: What are computer VIRUS, WORM and Trojan horse?
Q2: What network protocols are used in Cloud Computing?
Q3: What is DOS Attack?
Q4: What is resource management in cloud computing?
Q5: What is difference between HTTP and HTTPs?
Q6: What is scheduling in Cloud?
Q7: What is difference between authentication and authorization? Explain.
Q8: What is data encryption? Discuss some current techniques used for encryption.
Q9: What is SSL?
Q10: What is Identity Management System? How it is helpful in Cloud Computing?
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
“The upcoming sections cover introductory topic areas pertaining to the fundamental models used to categorize and define clouds and their most common service offerings, along with definitions of organizational roles and the specific set of characteristics that collectively distinguish a cloud.”
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
It's a simple presentation I did it with my friend Khawlah Al-Mazyd last year as a one topic should we cover it through doing Advanced Network course.
2010 - King Saud Universty
Riyadh - Saudi Arabia
Curious about the cloud? We've got answers. Join HOSTING for an overview of cloud hosting and computing basics. From the history of the cloud to the projected future, we'll investigate the foundation of this $2.1 billion industry.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Intro to cloud computing. Answering the question what, how and why. The components used in it. The tech formed from what. who give the cloud computing services for now.
Introduction
Cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”).
It is a paradigm that allows on-demand network access to shared computing resources. A model for managing, storing and processing data online via the internet.
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
Public-key cryptosystems produce constant-size cipher texts with efficient delegation
of decryption rights for any set of cipher texts. One can aggregate any set of secret keys and make
them as compact as a single key. The secret key holder can release a constant-size aggregate key for
flexible choices of cipher text set in cloud storage. In KAC, users encrypt a message not only under a
public-key, but also under an identifier of cipher text called class. That means the cipher texts are
further categorized into different classes. The key owner holds a master-secret called master-secret
key, which can be used to extract secret keys for different classes. More importantly, the extracted
key have can be an aggregate key which is as compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the decryption power for any subset of cipher text
classes. The key aggregate cryptosystem is enhanced with boundary less cipher text classes. The
system is improved with device independent key distribution mechanism. The key distribution
process is enhanced with security features to protect key leakage. The key parameter transmission
process is integrated with the cipher text download process.
Cloud Computing is the internet-based computing wherby shared resources, software, and information are provided to computers and other devices on demand, like the electrcity grid
Cloud computing basically involves delivering hosted services over the Internet to store, manage, and process data, instead of using local server or a personal computer. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In scientific terms, cloud computing is a synonym for distributed computing over a network which means the ability to run a program on many connected computers at the same time. Therefore it involves a large number of computers that are connected through a real-time communication network.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. loud computing in general can be portrayed as a synonym for distributed
computing over a network, with the ability to run a program or application on many
connected computers at the same time. It specifically refers to a computing hardware
machine or group of computing hardware machines commonly referred as a server connected
through a communication network such as the Internet, an intranet, a local area network
(LAN) or wide area network (WAN) and individual users or user who have permission to access
the server can use the server's processing power for their individual computing needs like to
run an application, store data or any other computing need. Therefore, instead of using a
personal computer every-time to run the application, the individual can now run the
application from anywhere in the world, as the server provides the processing power to the
application and the server is also connected to a network via internet or other connection
platforms to be accessed from anywhere
Characteristics:
Cloud computing exhibits the following key characteristics:
Agility improves with users' ability to re-provision technological infrastructure resources.
Application programming interface (API) accessibility to software that enables machines to
interact with cloud software in the same way that a traditional user interface (e.g., a
computer desktop) facilitates interaction between humans and computers. Cloud
computing systems typically use Representational State Transfer (REST)-based APIs.
Cost: cloud providers claim that computing costs reduce. A public-cloud delivery model
converts capital expenditure to operational expenditure. This purportedly lowers barriers to
entry, as infrastructure is typically provided by a third party and does not need to be
purchased for one-time or infrequent intensive computing tasks. Pricing on a utility
computing basis is fine-grained, with usage-based options and fewer IT skills are required
for implementation (in-house). The e-FISCAL project's state-of-the-art repository contains
several articles looking into cost aspects in more detail, most of them concluding that costs
C
3. savings depend on the type of activities supported and the type of infrastructure available
in-house.
Device and location independence enable users to access systems using a web browser
regardless of their location or what device they use (e.g., PC, mobile phone). As
infrastructure is off-site (typically provided by a third-party) and accessed via the Internet,
users can connect from anywhere.
Virtualization technology allows sharing of servers and storage devices and increased
utilization. Applications can be easily migrated from one physical server to another.
Multitenancy enables sharing of resources and costs across a large pool of users thus
allowing for:
Centralization of infrastructure in locations with lower costs (such as real estate,
electricity, etc.)
peak-load capacity increases (users need not engineer for highest possible load-levels)
utilization and efficiency improvements for systems that are often only 10–20%
utilized.
Reliability improves with the use of multiple redundant sites, which makes well-designed
cloud computing suitable for business continuity and disaster recovery.
Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-
grained, self-service basis in near real-time (Note, the VM startup time varies by VM type,
location, os and cloud providers), without users having to engineer for peak loads.
Performance is monitored, and consistent and loosely coupled architectures are
constructed using web services as the system interface.
Security can improve due to centralization of data, increased security-focused resources,
etc., but concerns can persist about loss of control over certain sensitive data, and the lack
of security for stored kernels. Security is often as good as or better than other traditional
systems, in part because providers are able to devote resources to solving security issues
that many customers cannot afford to tackle. However, the complexity of security is greatly
increased when data is distributed over a wider area or over a greater number of devices,
as well as in multi-tenant systems shared by unrelated users. In addition, user access to
security audit logs may be difficult or impossible. Private cloud installations are in part
motivated by users' desire to retain control over the infrastructure and avoid losing control
of information security.
Maintenance of cloud computing applications is easier, because they do not need to be
installed on each user's computer and can be accessed from different places.
4. Services:
Software as a Service (SaaS):
Most known and first service, major service given as part of cloud computing
service
In this case the application itself is provided by the service provider, typically via
web browser
Gartner estimates that SaaS revenue will be more than double its 2010 members
by 2015 and reach a projected $ 21.3 bn
Examples
User mail: Gmail, Hotmail
User pictures: Picasa , Flicker
Enterprise: WebEx , OfficeLive
Platform as a Service (PaaS):
PaaS – Platform as a Service
Hosted Application environment for developing and deploying cloud based
applications
Examples:
Google’s App engine
Amazon EC2
Microsoft Azure
Infrastructure as a Service (IaaS):
Iaas – Service provider offers capacity for rent basically hosted data centers and
servers
An evaluation of Web sites and server hosting services which provided services
and virtual private servers.
Examples:
Amazon EC2
Rackspace
AT&T – hosting and storage
5. Advantages:
Cloud computing relies on sharing of resources to achieve coherence and economies of
scale, similar to a utility (like the electricity grid) over a network.
Cloud computing is the broader concept of converged infrastructure and shared
services.
The cloud also focuses on maximizing the effectiveness of the shared resources.
Cloud resources are usually not only shared by multiple users but are also dynamically
reallocated per demand. This can work for allocating resources to users. For example, a
cloud computer facility that serves European users during European business hours with
a specific application (e.g., email) may reallocate the same resources to serve North
American users during North America's business hours with a different application (e.g.,
a web server).
Cloud Computing should maximize the use of computing power thus reducing
environmental damage as well since less power, air conditioning, rackspace, etc. are
required for a variety of functions.
With cloud computing, multiple users can access a single server to retrieve and update
their data without purchasing licenses for different applications.
6. Cloud Computing Deployment Models
An agency can deploy cloud computing in several different ways depending upon many factors,
such as:
Where the cloud services are hosted
Security requirements
Desire to share cloud services
The ability to manage some or all of the services
Customization capabilities
There are four common deployment models for cloud services loosely determined by who has
access to the cloud services: Public Cloud, Private Cloud, Community Cloud, and Hybrid Cloud.
Public Cloud:
A "public" cloud infrastructure is available to the general public and is owned by a third party
cloud service provider (CSP). In a public cloud, an agency dynamically provisions computing
resources over the Internet from a CSP who shares its resources with other organizations.
Similar to that of an electric utility billing system, the CSP bills the agency for its share of
resources.
This can be the most cost effective deployment model for agencies as it gives them the
flexibility to procure only the computing resources they need and delivers all services with
consistent availability, resiliency, security, and manageability. Nevertheless, to benefit from a
public cloud, an agency must accept the reduced control and monitoring over the CSP’s
governance and security.
7. Private Cloud:
A "private" cloud infrastructure is operated solely for a single organization or agency: the CSP
dedicates specific cloud services to that agency and no other clients. The agency specifies,
architects, and controls a pool of computing resources that the CSP delivers as a standardized
set of services. A common reason for agencies to procure private clouds is their ability to
enforce their own data security standards and controls.
An agency will typically host private cloud on-premises, connect to it through private network
links, and only share its resources within the agency. Because resources are not pooled across
multiple unaffiliated organizations, an agency will pay for all of the cloud's capacity.
Nevertheless, the agency's Chief Information Officer (CIO) can provide these resources as
services on-demand to organizations and programs within the agency and charge them
accordingly.
Community Cloud
A "community" cloud infrastructure is procured jointly by several agencies or programs that
share specific needs such as security, compliance, or jurisdiction considerations. The agencies
or CSP may manage the community cloud and may keep it on-premises or off-premises.
When agencies have a common set of requirements and customers, a community cloud enables
them to combine assets and share computing resources, data, and capabilities. By eliminating
the duplication of similar systems, agencies can save money and allocate their scarce resources
8. more efficiently. Procuring a community cloud is also a way that an agency can advance
the Federal IT Shared Service Strategy.
Hybrid Cloud:
A "hybrid" cloud comprises two or more clouds (private, community, or public)
with a mix of both internally and externally hosted services.
Agencies will likely not limit themselves to one cloud deployment but will
rather incorporate different and overlapping cloud services to meet their
unique requirements. Hybrid deployment models are complex and require
careful planning to execute and manage especially when communication
between two different cloud deployments is necessary.
9. Research
Many universities, vendors, Institutes and government organizations are investing in research
around the topic of cloud computing:
In October 2007, the Academic Cloud Computing Initiative (ACCI) was announced as a
multi-university project designed to enhance students' technical knowledge to address the
challenges of cloud computing.
In April 2009, UC Santa Barbara released the first open source platform-as-a-
service, AppScale, which is capable of running Google App Engine applications at scale on a
multitude of infrastructures.
In April 2009, the St Andrews Cloud Computing Co-laboratory was launched, focusing on
research in the important new area of cloud computing. Unique in the UK, Stack aims to
become an international centre of excellence for research and teaching in cloud computing
and provides advice and information to businesses interested in cloud-based services.
In January 2011, the IRMOS EU-funded project developed a real-time cloud platform,
enabling interactive applications to be executed in cloud infrastructures.
In June 2011, two Indian Universities i.e. University of Petroleum and Energy
Studies and University of Technology and Management introduced cloud computing as a
subject in India, in collaboration with IBM.
In October 2012, the Centre For Development of Advanced Computing released an open
source, complete cloud service, software suite called "Meghdoot".