Cloud Computing Synopsis and Recommendations

This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the relative opportunities and risks of cloud computing.

[1]  Gerald J. Popek,et al.  Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.

[2]  Paul V. Mockapetris,et al.  Domain names: Concepts and facilities , 1983, RFC.

[3]  Paul V. Mockapetris,et al.  Domain names - implementation and specification , 1987, RFC.

[4]  Douglas E. Comer,et al.  Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .

[5]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[6]  Elizabeth D. Zwicky,et al.  Building internet firewalls , 1995 .

[7]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[8]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[9]  Jeremy Epstein Architecture and concepts of the ARGuE Guard , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[10]  Yakov Rekhter,et al.  BGP/MPLS VPNs , 1999, RFC.

[11]  Howard Gobioff,et al.  The Google file system , 2003, SOSP '03.

[12]  Archana Ganapathi,et al.  Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.

[13]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[14]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[15]  Tatu Ylönen,et al.  The Secure Shell (SSH) Protocol Architecture , 2006, RFC.

[16]  Jesse James Garrett Ajax: A New Approach to Web Applications , 2007 .

[17]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[18]  Leendert van Doorn,et al.  Virtualization and Hardware-Based Security , 2008, IEEE Security & Privacy.

[19]  Wilson C. Hsieh,et al.  Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.

[20]  Eli M. Dow,et al.  Running Xen: A Hands-On Guide to the Art of Virtualization , 2008 .

[21]  Eugene Ciurana,et al.  Google App Engine , 2009 .

[22]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[23]  Gautam Shroff Enterprise Cloud Computing: Technology, Architecture, Applications , 2010 .

[24]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[25]  Clodoaldo Robledo,et al.  Google Web Toolkit , 2012 .