SlideShare a Scribd company logo
1 of 92
Effectively and Securely Using the Cloud Computing Paradigm Peter Mell, Tim Grance NIST, Information Technology Laboratory 10-7-2009
NIST Cloud Research Team ,[object Object],[object Object],[object Object],[object Object],[object Object],Contact information is available from: http://www.nist.gov/public_affairs/contact.htm
NIST Cloud Computing Resources ,[object Object],[object Object],[object Object]
Caveats and Disclaimers ,[object Object],[object Object],[object Object],Citation Note: All sources for the material in this presentation are included within the Powerpoint “notes” field on each slide
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Part I: Effective and Secure Use
Understanding Cloud Computing
Origin of the term “Cloud Computing” ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Working Definition of Cloud Computing ,[object Object],[object Object]
5 Essential Cloud Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3 Cloud Service Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Model Architectures
4 Cloud Deployment Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Cloud Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The NIST Cloud Definition Framework Deployment Models Service Models Essential Characteristics Common  Characteristics Homogeneity Massive Scale Resilient Computing Geographic Distribution Community Cloud Private Cloud Public Cloud Hybrid Clouds Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service Low Cost Software Virtualization Service Orientation Advanced Security
Cloud Computing Security
Security is the Major Issue
Analyzing Cloud Security ,[object Object],[object Object],[object Object],[object Object],[object Object],Former Intel CEO, Andy Grove: “only the paranoid survive”
General Security Advantages ,[object Object],[object Object],[object Object],[object Object]
General Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Relevant Cloud Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Provisioning Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Storage Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Processing Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Support Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Network and Perimeter Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security Advantages Part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cloud Security Advantages Part 2
Cloud Security Challenges Part 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Security Challenges Part 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Migration Paths for Cloud Computing
The ‘Why’ and ‘How’ of Cloud Migration ,[object Object],[object Object],[object Object]
Balancing Threat Exposure and Cost Effectiveness ,[object Object],[object Object],[object Object]
Cloud Migration and Cloud Security Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Putting it Together ,[object Object],[object Object],[object Object],[object Object]
Migration Paths for  Cloud Adoption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Possible Effects of Cloud Computing ,[object Object],[object Object],[object Object],[object Object]
Cloud Computing and Standards
Cloud Standards Mission ,[object Object]
NIST and Standards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Goal of NIST Cloud Standards Effort ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Model for Standardization and Proprietary Implementation ,[object Object],[object Object],Standardized Core Cloud Capabilities Proprietary Value Add Functionality
Proposed Result ,[object Object],[object Object],[object Object]
A proposal: A NIST Cloud Standards Roadmap ,[object Object],[object Object],[object Object],[object Object]
Towards the Creation of a Roadmap (I) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Towards the Creation of a Roadmap (II) ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Roadmap for IaaS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Roadmap for PaaS and SaaS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security and Data Privacy Across IaaS, PaaS, SaaS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Computing Publications
Planned NIST  Cloud Computing Publication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Part II: Cloud Resources, Case Studies, and Security Models
Thoughts on Cloud Computing
Thoughts on Cloud Computing ,[object Object],[object Object],[object Object]
Thoughts on Cloud Computing ,[object Object],[object Object],[object Object],[object Object]
Thoughts on Cloud Computing ,[object Object],[object Object]
Core objectives of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “sunny” vision of the future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Foundational Elements of Cloud Computing
Foundational Elements of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Primary Technologies Other Technologies
Web 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Consumer Software Revolution
Software as a Service (SaaS) ,[object Object],[object Object],[object Object],[object Object],Enterprise Software Revolution
Three Features of  Mature SaaS Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SaaS Maturity Levels ,[object Object],[object Object],[object Object],[object Object],Source: Microsoft MSDN Architecture Center
Utility Computing ,[object Object],[object Object],[object Object],[object Object]
Service Level Agreements (SLAs) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Autonomic System Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Grid Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Platform Virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Oriented Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web application frameworks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Free and Open Source Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Statistics on Cloud Economics
Cost of Traditional Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Energy Conservation and Data Centers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Economics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud Economics ,[object Object],[object Object]
Cloud Computing Case Studies and Security Models
Google Cloud User: City of Washington D.C. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Are Hybrid Clouds in our Future? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
vCloud Initiative ,[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Azure Services Source: Microsoft Presentation, A Lap Around Windows Azure, Manuvir Das
Windows Azure Applications,  Storage, and Roles Cloud Storage (blob, table, queue) Web Role LB n Worker Role m Source: Microsoft Presentation, A Lap Around Windows Azure, Manuvir Das
Case Study: Facebook’s Use of Open Source and Commodity Hardware (8/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: IBM-Google Cloud (8/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Amazon Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amazon Cloud Users:  New York Times and Nasdaq (4/08) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study:  Salesforce.com in Government ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study:  Salesforce.com in Government ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contact information is available from: http://www.nist.gov/public_affairs/contact.htm

More Related Content

What's hot

Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Services
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityGahya Pandian
 

What's hot (20)

Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Viewers also liked

Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP)Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP)GovCloud Network
 
Mobility and federation of Cloud computing
Mobility and federation of Cloud computingMobility and federation of Cloud computing
Mobility and federation of Cloud computingDavid Wallom
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case NarrativesJhoy Pedreza
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sampleoaes2006
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsERPScan
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...James W. De Rienzo
 
From ISO to Implementation A framework for ECM Implementation
From ISO to Implementation  A framework for ECM ImplementationFrom ISO to Implementation  A framework for ECM Implementation
From ISO to Implementation A framework for ECM Implementationgbroadbent67
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeDavid Ochel
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 

Viewers also liked (20)

Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP)Federal Risk and Authorization Management Program (FedRAMP)
Federal Risk and Authorization Management Program (FedRAMP)
 
Mobility and federation of Cloud computing
Mobility and federation of Cloud computingMobility and federation of Cloud computing
Mobility and federation of Cloud computing
 
Acitivity diagram
Acitivity diagramAcitivity diagram
Acitivity diagram
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
 
From ISO to Implementation A framework for ECM Implementation
From ISO to Implementation  A framework for ECM ImplementationFrom ISO to Implementation  A framework for ECM Implementation
From ISO to Implementation A framework for ECM Implementation
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
E-Government
E-GovernmentE-Government
E-Government
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 

Similar to Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and servicesJas Preet
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelIOSR Journals
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.pptArunKumbi1
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedingsSTO STRATEGY
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 

Similar to Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26 (20)

Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky ModelSecurity Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
Security Threat Solution over Single Cloud To Multi-Cloud Using DepSky Model
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.ppt
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Cloud security
Cloud securityCloud security
Cloud security
 
(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings(Pdf) yury chemerkin _ita_2013 proceedings
(Pdf) yury chemerkin _ita_2013 proceedings
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 

More from Bill Annibell

Drupal GovCon 2021 - Using Agile to Plan & Execute Better Together
Drupal GovCon 2021 - Using Agile to Plan & Execute Better TogetherDrupal GovCon 2021 - Using Agile to Plan & Execute Better Together
Drupal GovCon 2021 - Using Agile to Plan & Execute Better TogetherBill Annibell
 
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking About
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking AboutDrupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking About
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking AboutBill Annibell
 
Innovation and risk taking quotes
Innovation and risk taking quotesInnovation and risk taking quotes
Innovation and risk taking quotesBill Annibell
 
Metz Middle School Career Day Prez
Metz Middle School Career Day PrezMetz Middle School Career Day Prez
Metz Middle School Career Day PrezBill Annibell
 
The Future State of Collaboration
The Future State of CollaborationThe Future State of Collaboration
The Future State of CollaborationBill Annibell
 
Cloud Computing Use Cases Whitepaper
Cloud Computing Use Cases WhitepaperCloud Computing Use Cases Whitepaper
Cloud Computing Use Cases WhitepaperBill Annibell
 

More from Bill Annibell (6)

Drupal GovCon 2021 - Using Agile to Plan & Execute Better Together
Drupal GovCon 2021 - Using Agile to Plan & Execute Better TogetherDrupal GovCon 2021 - Using Agile to Plan & Execute Better Together
Drupal GovCon 2021 - Using Agile to Plan & Execute Better Together
 
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking About
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking AboutDrupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking About
Drupal GovCon 2021 - The MOST Important Agile Role NO ONE is Talking About
 
Innovation and risk taking quotes
Innovation and risk taking quotesInnovation and risk taking quotes
Innovation and risk taking quotes
 
Metz Middle School Career Day Prez
Metz Middle School Career Day PrezMetz Middle School Career Day Prez
Metz Middle School Career Day Prez
 
The Future State of Collaboration
The Future State of CollaborationThe Future State of Collaboration
The Future State of Collaboration
 
Cloud Computing Use Cases Whitepaper
Cloud Computing Use Cases WhitepaperCloud Computing Use Cases Whitepaper
Cloud Computing Use Cases Whitepaper
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26

Editor's Notes

  1. Cloud Computing Quotes from Vivek Kundra (Federal CIO): "The cloud will do for government what the Internet did in the '90s," he said. "We're interested in consumer technology for the enterprise," Kundra added. "It's a fundamental change to the way our government operates by moving to the cloud. Rather than owning the infrastructure, we can save millions." http://www.nextgov.com/nextgov/ng_20081126_1117.php “ I believe it's the future," he says. "It's moving technology leaders away from just owning assets, deploying assets and maintaining assets to fundamentally changing the way services are delivered.“ http://www.cio.de/news/cio_worldnews/867008 "It's definitely not hype," says Vivek Kundra, CTO for the District of Columbia government, which plans to blend IT services provided from its own data center with external cloud platforms like Google Apps. "Any technology leader who thinks it's hype is coming at it from the same place where technology leaders said the Internet is hype.“ http://www.cio.de/news/cio_worldnews/867008/
  2. The NIST tree pictured is a direct decendant of the tree that dropped an apple on Sir Isaac Newton in 1665 (see http://www.gazette.net/gazette_archive/1997/199714/gaithersburg/news/a55925-1.html).
  3. Jeff Bezos’ quote: http://news.cnet.com/8301-13953_3-9977100-80.html?tag=mncol Kevin Marks quote: http://news.cnet.com/8301-13953_3-9938949-80.html?tag=mncol video interview
  4. Note 1: Cloud computing is still an evolving paradigm. Its definitions, use cases, underlying technologies, issues, risks, and benefits will be refined in a spirited debate by the public and private sectors. These definitions, attributes, and characteristics will evolve and change over time. Note 2: The cloud computing industry represents a large ecosystem of many models, vendors, and market niches. This definition attempts to encompass all of the various cloud approaches.
  5. Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider (e.g., java, python, .Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers).
  6. Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud . The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting).
  7. Cloud diagram idea inspired by Maria Spinola 8-31-09
  8. Credit: “Go Dog Go” is a children’s book by P.D. Eastman
  9. EDRM: Electronics Discovery Reference Model (http://www.edrm.net) ISP 15489: http://www.iso.org/iso/catalogue_detail?csnumber=31908
  10. Source: InfoWorld Quote, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-reality_2.html
  11. Source: CNET video interview 5/7/08 http://news.cnet.com/8301-13953_3-9938949-80.html?tag=mncol
  12. CNET Article written by Dan Farber 6/26/08 http://news.cnet.com/8301-13953_3-9978153-80.html?tag=mncol
  13. Source: http://news.cnet.com/8301-13953_3-9977100-80.html?tag=mncol
  14. Data source: CNET article 6/25/08 http://news.cnet.com/8301-13953_3-9977517-80.html?tag=mncol
  15. Source: Long tail, The Long Tail" by Chris Anderson , Wired , Oct. 2004 Source: O’Reilly quote, http://radar.oreilly.com/archives/2006/12/web-20-compact.html
  16. Source: Williams and computerworld quotes, Software as a service: The next big thing, Eric Knorr 23/03/06, http://www.computerworld.com.au/index.php/id;889026646;fp;4;fpid;1398720840
  17. Source: Scalable definition, André B. Bondi, 'Characteristics of scalability and their impact on performance', Proceedings of the 2nd international workshop on Software and performance, Ottawa, Ontario, Canada, 2000, ISBN 1-58113-195-X , pages 195 - 203 Source: Three attributes for SaaS, Architecture Strategies for Catching the Long Tail, Frederick Chong and Gianpaolo Carraro Microsoft Corporation April 2006, http://msdn.microsoft.com/en-us/library/aa479069.aspx
  18. Source: Architecture Strategies for Catching the Long Tail, Frederick Chong and Gianpaolo Carraro Microsoft Corporation April 2006, http://msdn.microsoft.com/en-us/library/aa479069.aspx
  19. Source SLA Zone: http://www.sla-zone.co.uk/ Wikipedia definition of SLA: http://en.wikipedia.org/wiki/Service_level_agreement
  20. Source: 38% statistic, Xiaolong Jin and Jiming Liu, " From Individual Based Modeling to Autonomy Oriented Computation ", in Matthias Nickles, Michael Rovatsos, and Gerhard Weiss (editors), Agents and Computational Autonomy: Potential, Risks, and Solutions , pages 151–169, Lecture Notes in Computer Science, vol. 2969, Springer, Berlin, 2004. ISBN 978-3-540-22477-8 . Source: 18:1 statistics, Trends in technology’, survey, Berkeley University of California, USA, March 2002 Source: IBM 4 properties, http://www-01.ibm.com/software/tivoli/autonomic/ Source: Autonomic properties, Wikipedia entry on autonomic system computing (providing an alternate vision to IBM’s)
  21. Source: “What is the Grid? A Three Point Checklist”, Ian Foster, http://www-fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf Source: Wikipedia, http://en.wikipedia.org/wiki/Grid_computing
  22. Source: ‘Web Services: Principles and Technology’ (Michael Papazoglou) Chapter 1 Source: Infoworld quote, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-reality_2.html Source: Rube Goldberg picture, http://en.wikipedia.org/wiki/Rube_Goldberg
  23. Source: ‘Web Services: Principles and Technology’ (Michael Papazoglou) Chapter 1
  24. Wikipedia list of frameworks: http://en.wikipedia.org/wiki/List_of_web_application_frameworks
  25. Source: 11.8 and 15%, Martin MC Brown, Computerworld, http://blogs.computerworld.com/data_center_utilization_15_of_11_8_million_is_a_big_number Source: $800, Ron Markezich, Vice President Microsoft Online, Microsoft talk at the Booz Allen Hamilton Cloud Computing Summit, 11/20/2008. Source: IBM Report May 2008, Creating a green data center to help reduce energy costs and gain a competitive advantage.
  26. Source: http://www.cloudave.com/link/global-green-computing-fund http://news.cnet.com/8301-11128_3-10140142-54.html?tag=newsEditorsPicksArea.0
  27. Source: Gartner stat, ComputerWeekly, 4/11/2008, http://www.computerweekly.com/galleries/233192-8/Gartner-fellow-Brian-Gammage-Align-IT-with-business-and-look-for-cost-savings-in-the-cloud.htm Source: Alchemy Plus, 12/3/08, http://www.infoworld.com/article/08/12/03/Scotland_hotbed_for_green_datacenters_1.html Source: Preferred Hotel, 11/24/08, http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9121485 Source: CTO DC, Mike Bradshaw, Google talk at the Booz Allen Hamilton Cloud Computing Summit, 11/20/2008. Patrick Marshall, The power of the cloud. Government Computer News, 9/29/08. http://www.gcn.com/print/27_24/47228-1.html
  28. Source: Reese, http://broadcast.oreilly.com/2008/10/the-economics-of-cloud-c.html
  29. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php
  30. Source: IBM hybrid cloud, http://news.cnet.com/8301-19413_3-10161245-240.html?tag=newsFeaturedBlogArea.0
  31. Source: vCloud press release, 9/15/08, http://vmware.com/company/news/releases/vcloud_vmworld08.html
  32. Data taken from CNET news article and interview 8/18/08 http://news.cnet.com/8301-13953_3-10027064-80.html?tag=mncol
  33. Source: Infoworld Article, http://www.infoworld.com/article/08/08/27/35NF-cloud-providers_2.html Source: IBM cloud presentation at BAH cloud computing summit 10/29/08
  34. Source: Infoworld article (availability zones and elastic IP), http://www.infoworld.com/article/08/03/27/Amazon-adds-resilience-to-cloud-computing_1.html
  35. Source: Infoworld, http://www.infoworld.com/article/08/04/07/15FE-cloud-computing-utility_1.html
  36. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php
  37. http://arstechnica.com/software/news/2008/10/washington-dc-latest-to-drop-microsoft-for-web-apps.ars Quote is from http://www.nextgov.com/nextgov/ng_20081126_1117.php