DocumentCode
144785
Title
Towards robust, scalable and secure network storage in Cloud Computing
Author
Al-Anzi, Fawaz S. ; Salman, Adnan Ahmed ; Jacob, Noby K. ; Soni, Jignesh
Author_Institution
Compute Eng. Dept., Kuwait Univ., Kuwait City, Kuwait
fYear
2014
fDate
6-8 May 2014
Firstpage
51
Lastpage
55
Abstract
The term Cloud Computing is not something that appeared overnight, it may come from the time when computer system remotely accessed the applications and services. Cloud computing is Ubiquitous technology and receiving a huge attention in the scientific and industrial community. Cloud computing is ubiquitous, next generation´s in-formation technology architecture which offers on-demand access to the network. It is dynamic, virtualized, scalable and pay per use model over internet. In a cloud computing environment, a cloud service provider offers “house of resources” includes applications, data, runtime, middleware, operating system, virtualization, servers, data storage and sharing and networking and tries to take up most of the overhead of client. Cloud computing offers lots of benefits, but the journey of the cloud is not very easy. It has several pitfalls along the road because most of the services are outsourced to third parties with added enough level of risk. Cloud computing is suffering from several issues and one of the most significant is Security, privacy, service availability, confidentiality, integrity, authentication, and compliance. Security is a shared responsibility of both client and service provider and we believe security must be information centric, adaptive, proactive and built in. Cloud computing and its security are emerging study area nowadays. In this paper, we are discussing about data security in cloud at the service provider end and proposing a network storage architecture of data which make sure availability, reliability, scalability and security.
Keywords
cloud computing; data integrity; data privacy; security of data; storage management; ubiquitous computing; virtualisation; Internet; adaptive security; authentication; built in security; client overhead; cloud computing environment; cloud service provider; compliance; confidentiality; data security; data sharing; data storage; information centric security; integrity; middleware; network storage architecture; networking; on-demand access; operating system; pay per use model; privacy; proactive security; remote application access; remote service access; robust scalable secure network storage; server; service availability; service outsourcing; ubiquitous next generation information technology architecture; virtualization; Availability; Cloud computing; Computer architecture; Data security; Distributed databases; Servers; Cloud Computing; Data Storage; Data security; RAID;
fLanguage
English
Publisher
ieee
Conference_Titel
Digital Information and Communication Technology and it's Applications (DICTAP), 2014 Fourth International Conference on
Conference_Location
Bangkok
Print_ISBN
978-1-4799-3723-3
Type
conf
DOI
10.1109/DICTAP.2014.6821656
Filename
6821656
Link To Document