CFP last date
20 January 2025
Reseach Article

Evaluating Cloud Computing for Futuristic Development

by Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 6
Year of Publication: 2013
Authors: Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid
10.5120/9932-4566

Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid . Evaluating Cloud Computing for Futuristic Development. International Journal of Computer Applications. 61, 6 ( January 2013), 18-27. DOI=10.5120/9932-4566

@article{ 10.5120/9932-4566,
author = { Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid },
title = { Evaluating Cloud Computing for Futuristic Development },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 6 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number6/9932-4566/ },
doi = { 10.5120/9932-4566 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:22.102289+05:30
%A Sarah Shafqat
%A Muhammad Daud Awan
%A Qaisar Javaid
%T Evaluating Cloud Computing for Futuristic Development
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 6
%P 18-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Purpose of this research is to evaluate cloud computing to put the foundation of an Architectural Framework for Trusted Cloud Computing (AFTCC) that would enable businesses to cut their costs by outsourcing their processes on-demand by verifying the confidentiality and integrity of their data and computation. On going research will clearly outline the enhanced execution environment that guarantees confidential execution of guest virtual machines. Further more, current research would allow users of the cloud to attest and determine whether or not the service provided is secure before their virtual machines are launched into the system knowing the identity of every personnel involved in this environment. The architecture would provide virtual view of the processes in the network interface enabling user level access to high-speed communication devices; like, bio-metric devices to enable user level forensic identification system. Also, it would provide architecture for implementation of a system that would do meaningful interpretation of raw data, and informing rightly to the right people at the right time. Current study mainlyfocuseson devising the Software Architecture for Trusted Cloud Computing. This research will outline the strengths and weaknesses identified in the literal work that has been done till now in Architectural Framework for Trusted Cloud Computing and its components and how they fit in. And will also identify the latest research and systems that are following it to some extent.

References
  1. Armbrust M. , Fox A. , Grif?th R. , Joseph A. D. , Katz R. , Konwinski A. , Lee G. , Patterson D. , Rabkin A. , Stoica I. , &Zaharia M. , Above the Clouds: A view of cloud computing, [UC Berkeley Reliable Adaptive Distributed systems Laboratory (RAD Lab)]
  2. Cloud computing - Wikipedia, the free encyclopedia. mht
  3. Chen Y. , Paxson V. & Katz R. H. , What's new about cloud computing security?, [CS Division, EECS Dept. UC Berkeley], 2010
  4. Casola V. , Rak M. & Villano U. , Identity federation in cloud computing, [Dipt. di Inf. e Sist. , Univ. degliStudi di Napoli Federico II, Naples, Italy], IEEE, 2010
  5. Depena R, Cloud Computing Companies to Watch in 2011 (2010 was certainly an exciting year in the Cloudsphere).
  6. Figure 1: Simple flow of Cloud Computing Infrastructure (Source: RAD Lab)
  7. Figure 2: Cisco Secure Cloud Data Center Framework [source: www. cisco. com], Cisco Cloud Computing - Data Center Strategy, Architecture, and Solutions Point of View White Paper [for U. S. Public Sector], 1st Edition.
  8. Figure 3: Cloud Computing sample architecture to understand cloud architecture [Source: cloud computing, Journal of Computing]
  9. Guha R. , Kumar R. , Raghavan P. & Tomkins A. , Propagation of Trust and Distrust, [IBM Almaden Research Center], 2004
  10. Guo H. , Wu W. , Wang W. & Chen J. , Personalization as a service: the architecture and a case study, [EMC Research China, Fudan Univerisity], 2009
  11. Han-zhang W. & Liu-sheng H. , An improved trusted cloud computing platform model based on DAA and privacy CA scheme, [Dept. of Comput. Sci. & Technol. , Univ. of Sci. & Technol. of China, Hefei, China], 2010
  12. Hwang K. & Li D. , Trusted Cloud Computing with Secure Resources and Data Coloring, [Univ. of Southern California, Los Angeles, CA, USA]
  13. Habib S. M. , Ries S. & Mühlhäuser M. , Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation, [Xi'an, China], 2010
  14. Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-Based Platforms, Enomaly Elastic Computing Platform, [Service Provider Edition]
  15. Jennings R. , How DevOps brings order to a cloud-oriented world, [searchCloudComputing. com]
  16. JERICHO, Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration, V1. 0 (Position Paper). Jericho Forum, 2009
  17. Knorr E. & Gruman G. , What cloud computing really means,[InfoWorld],link: http://www. infoworld. com/d/cloud-computing/what-cloud-computing-really-means-031
  18. Krautheim, F. J. Private Virtual Infrastructure for Cloud Computing. 2009
  19. Li X. ; Zhou L. ; Shi Y. & Guo Y. , A trusted computing environment model in cloud architecture, [Beijing Jiaotong Univ. , Beijing, China], 2010
  20. Luo M. ; Zhang L. & Lei F. , AnInsuanrance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing, [IEEE], 2010
  21. Mojica M. , Stephenson J. & Healey A. , Six questions every retail executive should ask about cloud computing, [Accenture]
  22. Mirashe S. P. & Dr. Kalyankar N. V. , Cloud Computing, Journal of computing, volume 2, issue 3, March 2010
  23. Pandit M. , Scalable Computing Programme Newsletter, [Digital Systems KTN], 3rd Edition, June 2010Ragnet F. , Can You Trust the Cloud? A Practical Guide to the Opportunities and Challenges Involved in Cloud Computing, [Xerox]
  24. Ranchal R. , Bhargava B. , Othmane L. B. , Lilien L. , Kim A. , Kang M. &Linderman M. ; Protection of Identity Information in Cloud Computing without Trusted Third Party, [Purdue University], [Western Michigan University], [Naval Research Laboratory], [Air Force Research Laboratory], USA
  25. Shimba F. , Cloud Computing: Strategies for Cloud Computing Adoption, Dublin Institute of Technology, 2010
  26. Shields G. , Can you trust your public cloud provider? searchCloudComputing. com
  27. Siemens IT Solutions and Services, Community Clouds – supporting business ecosystems with cloud computing
  28. Santos, N. , Gummadi, K. P. , et al. Towards Trusted Cloud Computing. Planc Institute for Software Systems, 2009
  29. Shen Z. , Li L. , Yan F. & Wu X. , Cloud Computing System Based on Trusted Computing Platform, [State Key Lab. of Software Eng. , Wuhan Univ. , Wuhan, China], 2010
  30. Website: www. salesforce. com, copyright 2000-2012
  31. Wu J. Y. , Shen Q. L. , Zhang J. L. & Xie Q. , Cloud Computing: Cloud Security to Trusted Cloud, [2011, Advanced Materials Research, 186, 596]
  32. Xiong L. & Liu L. , PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Computer Society
  33. Yachin D. , Israel Software Industry Review: Addressing Cloud Computing Challenges, February 2010
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Identity Management Architectural Framework Trusted Cloud