From Mainframe to Cloud

The adoption of cloud computing accelerated significantly over the past few years, and this trend will remain. As cloud-computing technologies and vendors mature, more educational institutions will adopt the Internet-based computing style. Organizations will use cloud computing to reduce the cost of e-mail, IT infrastructure, data centers and storage, and business applications. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. The absence of a clear definition of cloud computing is slowing the adoption of cloud computing by needlessly increasing user apprehension and obscuring the cloud’s benefits. Organizations need to understand cloud computing before they can realize its benefits and avoid its risks. This chapter clears up confusion about the cloud by defining cloud computing and its characteristics, architectural model, benefits, and shortcomings. This chapter provides the definition of the concept of cloud computing and cloud computing as a service. Subsequently, it explores the characteristics of different types of clouds, as well as the security aspect of this technology. Major trends of cloud computing, such as social computing, context-aware computing, and pattern based strategy, are described. In a conclusion, the authors provide an overview of future use of cloud computing.

[1]  Hiroyuki Sato,et al.  Risk Management on the Security Problem in Cloud Computing , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[2]  Yushi Shen,et al.  Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management , 2013 .

[3]  Y. Khalidi,et al.  Building a Cloud Computing Platform for New Possibilities , 2011, Computer.

[4]  Victor Chang,et al.  Delivery and Adoption of Cloud Computing Services in Contemporary Organizations , 2015 .

[5]  Dean Gonsowski Compliance in the Cloud and the Implications on Electronic Discovery , 2015 .

[6]  Fawzy Soliman Business Transformation and Sustainability through Cloud System Implementation , 2014 .

[7]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[8]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[9]  Asad Waqar Malik,et al.  Ceaseless Virtual Appliance Streaming: Creation and Transmission of Virtual Packs over Network , 2016 .

[10]  Klaus-Dieter Schewe,et al.  Challenges in Cloud Computing , 2011, Scalable Comput. Pract. Exp..

[11]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[12]  Raihan Ur Rasool,et al.  Managing and Processing Big Data in Cloud Computing , 2016 .

[13]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[14]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[15]  Robert John Walters,et al.  A Resource Allocation Model for Desktop Clouds , 2015, Web Services.

[16]  Luis Miguel Vaquero Gonzalez,et al.  Locking the sky: a survey on IaaS cloud security , 2010, Computing.

[17]  Mohamed Firdhous,et al.  Strategies for Evaluating Cloud System Providers during the Transformation of Businesses , 2015 .

[18]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[19]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[20]  Yushi Shen,et al.  Data Protection in the Cloud Era , 2014 .

[21]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[22]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[23]  Kyle Chard,et al.  Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[24]  Mark S. Granovetter T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .

[25]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.