Mahir’s Expanded Definition of Cloud Computing

TO: Prof. Jason Ellis

FROM: Mahir Faisal

DATE: March 26th ,2021

SUBJECT: Expanded Definition of Cloud Computing

Introduction

The Purpose of 750-1000 Word Expanded Definition project is to show the readers about the use cases of a specific term in different contexts and quotes. The term I have selected for my 750-1000 word expanded definition project is “Cloud Computing”. I am going to discuss the term in my own words by comparing the term with the definitions and contextual sentences I have included on this document. In the following document, I discussed several definitions of the term, I compared several contextual uses of the term and finally I wrote my own working definition of the term.

Definitions

“An approach to computing in which the end user connects to a remote network of computers (the cloud) to run programs, store data, etc. This enables users to access large amounts of data storage and computing power from anywhere in the world without having to own and maintain these resources themselves.” (Oxford University Press,2016)

On my First definition it explains cloud computing infrastructure help users remotely to elastically run programs, databases and provide storage options to secure the data. In addition, users have access to the system anytime without the necessity of maintaining a whole data centers and servers. On the second definition, the concept of cloud computing is similar. For example- Cloud Services has five characteristics which defines the availability and compatibility of the resources and gives the privilege to interact with the services.

“According to National Institute of Science and Technology the definition of cloud computing outlines five key cloud characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.” (Derrick et al.,2014)


On this definition the author gives solid definition on cloud computing by providing its five pillars. It means cloud infrastructure provides on demand services, remotely access the network, effective resources, rapidly increase the demand of the instances (Virtual Computers), and measured services. All these services and resources help the users to effectively conduct their applications and programs without the provisioning of the servers or storage. Cloud providers do everything for them if they choose Software as Service model (SaaS). Compare to the First Definition this definition gives the broader picture of cloud infrastructure and its services.

Context

Cloud computing is the main component of the modern widespread paradigm, where resources are shared and globally accessed over the network. This has rendered the Internet a large repository where most of the available resources can be accessed “as a service.”

I have found this contextual sentence on a book called “Security for cloud computing” where this Quote explains cloud resources can be accessed and shared globally as a service. Most users share the data over the network to make it redundant. However, these resources have some limitations to prevent any kind of network attacks. Many companies are migrating to the cloud for better cost optimization and performance efficiency. The similarity between the contextual quotes is cloud computing are providing resources with cost savings, resilient performance, and constant availability of the data.

In cloud computing, a resource provisioning mechanism is required to supply cloud consumers a set of computing resources for processing the jobs and storing the data. Cloud providers can offer cloud consumers two resource provisioning plans, namely short-term on-demand, and long-term reservation plans. (Chai Siri et al.,2012, p. 164)

  I have found this contextual sentence on an article called “Optimization of Resource Provisioning Cost in Cloud Computing”. This quote explains a functional computing requires resource Provisioning which means the selection, deployment, and run-time management of software. Moreover, Hardware provisioning is also required for better performance. Without the provision a service would not function properly, and users cannot compute. To make this work, many users choose short term on demand instances (Virtual computers) to run the programs or batch jobs for schedule system updates, and for long term usage, users choose reserved instances for cheaper cost and effective performance and they can use the instance for 1-3 years.

Working Definition

Based on my analysis and research I can say that cloud computing has made huge impact on organizations. The resources and services help the users to maintain the data and run programs without having the necessity of maintaining the servers and data centers. Thus, Users can choose provisioning plans for better cost optimization and redundant performance.

References

Rountree, Derrick, and Ileana Castrillo. The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice, Elsevier Science & Technology Books, 2013. ProQuest eBook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=1115176.
Created from citytech-ebooks on 2021-03-06 16:45:51.

Lombardi, Flavio, and Pietro, Roberto Di. Security for Cloud Computing, Artech House, 2015. ProQuestEbook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=4186582.
Created from citytech-ebooks on 2021-03-06 17:53:08.

S. Chaisiri, B. Lee and D. Niyato, “Optimization of Resource Provisioning Cost in Cloud Computing,” in IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 164-177, April-June 2012, doi: 10.1109/TSC.2011.7.

Summary of Yuzhao Wu’s ” Cloud Storage Security Assessment Through Equilibrium Analysis”

TO: Prof. Ellis

FROM: Mahir Faisal

DATE: 03/03/2021

SUBJECT: 500-Word summery of Article about Cloud Storage Security Assessment Through Equilibrium Analysis

The following is a 500-word summery of a peer-reviewed article about essential Security Analysis of cloud storage solution. The authors discussed about how cloud providers and third-party providers can provide strong security measurements and effective data protection to make the data more secured and reliable in cloud infrastructure. Cloud storage solution has been widely used by the companies and enterprises to put their data and information to the cloud servers. Users can upload their data on the cloud and access to the data without having any issues. however, as user data contains confidential information Network attackers target third-party cloud service providers to hack the user data. Some methods and schemes have been proposed for risk assessment of the cloud which will help cloud providers to act as a defender of security. However, Users cannot have full trust in These service providers because they may ensure the integrity and confidentiality of the data, but they may have accessed the content of the data. For example- Cloud service providers are responsible for the security of the data whereas cloud infrastructure providers make resources available on the cloud, they do not do security assessments as cloud service providers do. There is a chance of having conflicts of benefits between attackers and defenders. This conflict of benefits may drive users to think that cloud providers have a lack of appropriate assessment mechanisms. Some Third-party Service providers serve security services to cloud providers by encrypting user data. But the benefit conflicts with cloud providers and users make them semi-trustworthy the same as cloud providers. According to the author’ each person’s benefit is determined by the security level of the whole system.” (Wu et al., 2019, p. 739). If the layer of security is strong, then an attacker needs to solve security mechanisms one by one which will become difficult for the attackers to decrypt it. Another point to be noted that decision-makers can be divided into attackers and defenders, Users and cloud providers can act as attackers or defenders. However, to solve this issue, game theory offers tools and models help decision-makers to make a strategy. study shows that by assessing the security of public cloud storage providers and third-party mediators through equilibrium analysis. To be precise, we conduct evaluations and assessments on a series of game models between public cloud storage providers and users to analyze the security of different services. By using the game theory model, users can analyze the risk of whether their private data is likely to be hacked by the cloud service providers. Moreover, Cloud service providers can make effective strategies to improve their service and make it more trustworthy. For example- if a cloud service provider uses a Nash equilibrium strategy and would not steal user data then the cloud system has effective internal security and confidentiality to the user data and privacy. A semi trustworthy Third-party Service providers will give additional security to the user data if users have trust in Third-party providers as same as Cloud service providers. I believe that cloud providers should emphasize strong security measurements and assessment mechanisms to protect the confidentiality and integrity of user data.

Reference

Y. Wu., Y. Lyu., & Y. Shi. (2019) “Cloud storage security assessment through equilibrium analysis,” in Tsinghua Science and Technology, vol. 24, no. 6, pp. 738-749,    Dec.2019,  DOI :   10.26599/TST.2018.9010127