CFP last date
20 December 2024
Reseach Article

Promises and Challenges of Cloud Computing

Published on June 2013 by Edward S David
International Conference on Current Trends in Advanced Computing ICCTAC 2013
Foundation of Computer Science USA
ICCTAC - Number 1
June 2013
Authors: Edward S David
514e0067-1811-4a55-a67e-53dcb007cbb3

Edward S David . Promises and Challenges of Cloud Computing. International Conference on Current Trends in Advanced Computing ICCTAC 2013. ICCTAC, 1 (June 2013), 41-44.

@article{
author = { Edward S David },
title = { Promises and Challenges of Cloud Computing },
journal = { International Conference on Current Trends in Advanced Computing ICCTAC 2013 },
issue_date = { June 2013 },
volume = { ICCTAC },
number = { 1 },
month = { June },
year = { 2013 },
issn = 0975-8887,
pages = { 41-44 },
numpages = 4,
url = { /proceedings/icctac/number1/12269-1315/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Current Trends in Advanced Computing ICCTAC 2013
%A Edward S David
%T Promises and Challenges of Cloud Computing
%J International Conference on Current Trends in Advanced Computing ICCTAC 2013
%@ 0975-8887
%V ICCTAC
%N 1
%P 41-44
%D 2013
%I International Journal of Computer Applications
Abstract

Cloud computing has hit the information technology landscape like a tsunami. But, is it a right strategy? Is it feasible to integrate with enterprise infrastructure? Is it safe and secure? We will examine these questions from various points of views. All of best practices and process for securing and stabilizing the enterprise IT infrastructure still apply with cloud computing. Every multi-national organization has adopted this technology and started thinking of moving more and more IT assets to the clouds. We will explore 3 benefits and 3 challenges of implementing cloud computing from enterprise perspectives. Benefits: 1) Operational efficiency 2) Financial gain 3) Process automation. Challenges: 1) Security Management 2) Vendor Risks 3) Layered cloud architecture

References
  1. IDC revenue survey http://www. idc. com/prodserv/idc_cloud. jsp.
  2. Peter Mell, and Timothy Grance http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf
  3. CIO white paper –IBM http://www. ciosummits. com/media/pdf/cloud/IBM_staying_aloft_in_tough_times. pdf.
  4. Gerald Briscoe and Alexandros Marinos. "Digital Eco Systems in the Clouds: Towards Community Cloud computing," 2009, http://arxiv. org/pdf/0903. 0694v3
  5. OAuth 2. 0 Framework http://tools. ietf. org/html/draft-ietf-oauth-v2-31
  6. Security Considerations for Platform as a Service (PaaS) http://social. technet. microsoft. com/wiki/contents/articles/3809. security-considerations-for-platform-as-a-service-paas. aspx
  7. National vulnerability Database http://web. nvd. nist. gov/view/vuln/search.
  8. Common weakness enumeration http://cwe. mitre. org/.
Index Terms

Computer Science
Information Sciences

Keywords

Promise And Challenge Cloud Computing Defined Layered Cloud Architecture Securing Vm Boundaries