Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Assessing the Risks and Opportunities of Cloud Computing
MIỄN PHÍ
Số trang
5
Kích thước
456.3 KB
Định dạng
PDF
Lượt xem
1455

Assessing the Risks and Opportunities of Cloud Computing

Nội dung xem thử

Mô tả chi tiết

978-1-4244-9008-0/10/$26.00 ©2010 IEEE 138

Assessing the Risks and Opportunities of Cloud

Computing – Defining Identity Management Systems

and Maturity Models

R.PalsonKennedy

Research Scholar, A.P, RREC

Anna University, Chennai-95, India

[email protected]

T.V.Gopal

Dept of CSE

CEG,Anna University,

Chennai-25, India

Abstract— Despite the potential that Cloud Computing has for

revolutionizing every aspect of the software industry, there are

significant shortcomings in the area of security and risk

assessment and mitigation. The basic value proposition of

Cloud Computing is that by leasing applications online,

companies have the potential to significantly reduce their

operating costs. What is not often pointed out however is the

fact that identity management on Cloud Computing platforms

is still in its nascent or very embryonic stages. Often identity

management systems fail to fully protect all assets of a given

Cloud Computing platform as role-based access has yet to be

defined and implemented. Lacking is a protocol stack of Cloud

Computing Identity Management and a maturity model to

assist organizations in assessing their relative levels of risk. The

intent of this analysis is to provide the frameworks for both the

protocol stack and maturity model for Cloud Computing

platforms.

Keywords- Cloud computing,Risk,Security,IMS

I. INTRODUCTION

A. Assessing Cloud Computing

The collection of technologies that comprise the Cloud

Computing platforms being sold as services today have been

in existence for decades as the basis of enterprise systems

and platform deployments. Specifically including

integration platforms including Enterprise Application

Integration (EAI), networking platforms and products and

servers, and strong reliance on TCP/IP, with the inclusion of

data center virtualization algorithms to ensure their

scalability, Cloud Computing platforms are an outgrowth of

enterprise-wide networks that had been created in previous

decades.

Despite how time-tested these core components are, the

relatively recent developments in Web-based application

development have created security vulnerabilities at the

application and also at the service provider level. Given how

cloud providers must integrate disparate, often conflicting

database together to create a multi-tenancy platform the

tendency to cut corners and do AJAX-based scripting that

exposes an entire application online has been known to

occur. The underlying technologies are fundamentally sound

yet the cloud providers in many cases are not taking all

necessary

Precautions in creating multi-tenancy and secured client

locations on their servers. Often organizations contracting

with cloud providers may be attracted to the very low prices

offered for hosting yet have no idea of the risks and potential

security lapses that could result due to the providers’

unwillingness to invest in adequate Web-based security.

Studies indicate the plummeting prices of Cloud storage and

application hosting are partially driven by the cost reductions

made possible by cutting corners on security. To have an

appreciation of the trade-offs being made from a security

standpoint, it is imperative to understand the levels or

fundamental structure of Cloud Computing. Fig. 1 presents

the structure with Infrastructure-as-a-Service (IaaS) at the

bottom of the protocol stack, as this is the foundation on

which Cloud-based platforms are built. IaaS is comprised of

those technologies which have the greatest number of years

in use and as a result many of them have advanced security

and encryption algorithms associated with them. Servers,

networking, data centers and storage including storage area

networks (SANs) have advanced authentication and

verification technologies associated with them, many in

single-instance installation.

Figure 1: Fundamental Structure of Cloud Computing

Tải ngay đi em, còn do dự, trời tối mất!