Different Perspectives of Cloud Security

Cloud storage systems can be considered to be a network of distributed datacenters that typically use cloud computing technology like virtualization and offer some kind of interface for storing data. To increase the availability of the data, it may be redundantly stored at different locations. Basic cloud storage is generally not designed to be accessed directly by users but rather incorporated into custom software using API. Cloud computing involves other processes besides storage. In this chapter, the authors discuss different viewpoints for cloud computing from the user, legal, security, and service provider perspectives. From the user viewpoint, the stored data creates a mirror of currently available local data. The backup feature allows users to recover any version of a previously stored data. Synchronization is the process of establishing consistency among the stored data. From the legal viewpoint, provisions regulating the user processing and storage of the data must have to be constant from when the data is stored in the cloud. The security viewpoint requires interaction with the Web application, data storage, and transmission. The service provider viewpoint requires the maximum level of cloud storage service at the minimum cost.

[1]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[2]  Tristan Glatard,et al.  Self-Management of Operational Issues for Grid Computing: The Case of the Virtual Imaging Platform , 2015 .

[3]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[4]  Marijana Despotović-Zrakić,et al.  Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education , 2014 .

[5]  César A. F. De Rose,et al.  Application-Level Monitoring and SLA Violation Detection for Multi-Tenant Cloud Services , 2015 .

[6]  Susmit Bagchi,et al.  Emerging Research in Cloud Distributed Computing Systems , 2015 .

[7]  Roy Fielding,et al.  Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .

[8]  George Mastorakis Resource Management of Mobile Cloud Computing Networks and Environments , 2015 .

[9]  Rabindra K. Barik,et al.  Dynamic Dedicated Server Allocation for Service Oriented Multi-Agent Data Intensive Architecture in Biomedical and Geospatial Cloud , 2014, Int. J. Cloud Appl. Comput..

[10]  Yeh-Ching Chung,et al.  Computing Traffic Information in the Cloud , 2014, Int. J. Grid High Perform. Comput..

[11]  Veljko Milutinovic,et al.  Exploiting Spatial and Temporal Patterns in a High-Performance CPU , 2014 .

[12]  Kijpokin Kasemsap The Role of Cloud Computing Adoption in Global Business , 2015 .