Research Article

Evaluating Cloud Computing for Futuristic Development

by  Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Issue 6
Published: January 2013
Authors: Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid
10.5120/9932-4566
PDF

Sarah Shafqat, Muhammad Daud Awan, Qaisar Javaid . Evaluating Cloud Computing for Futuristic Development. International Journal of Computer Applications. 61, 6 (January 2013), 18-27. DOI=10.5120/9932-4566

                        @article{ 10.5120/9932-4566,
                        author  = { Sarah Shafqat,Muhammad Daud Awan,Qaisar Javaid },
                        title   = { Evaluating Cloud Computing for Futuristic Development },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 61 },
                        number  = { 6 },
                        pages   = { 18-27 },
                        doi     = { 10.5120/9932-4566 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Sarah Shafqat
                        %A Muhammad Daud Awan
                        %A Qaisar Javaid
                        %T Evaluating Cloud Computing for Futuristic Development%T 
                        %J International Journal of Computer Applications
                        %V 61
                        %N 6
                        %P 18-27
                        %R 10.5120/9932-4566
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Purpose of this research is to evaluate cloud computing to put the foundation of an Architectural Framework for Trusted Cloud Computing (AFTCC) that would enable businesses to cut their costs by outsourcing their processes on-demand by verifying the confidentiality and integrity of their data and computation. On going research will clearly outline the enhanced execution environment that guarantees confidential execution of guest virtual machines. Further more, current research would allow users of the cloud to attest and determine whether or not the service provided is secure before their virtual machines are launched into the system knowing the identity of every personnel involved in this environment. The architecture would provide virtual view of the processes in the network interface enabling user level access to high-speed communication devices; like, bio-metric devices to enable user level forensic identification system. Also, it would provide architecture for implementation of a system that would do meaningful interpretation of raw data, and informing rightly to the right people at the right time. Current study mainlyfocuseson devising the Software Architecture for Trusted Cloud Computing. This research will outline the strengths and weaknesses identified in the literal work that has been done till now in Architectural Framework for Trusted Cloud Computing and its components and how they fit in. And will also identify the latest research and systems that are following it to some extent.

References
  • Armbrust M. , Fox A. , Grif?th R. , Joseph A. D. , Katz R. , Konwinski A. , Lee G. , Patterson D. , Rabkin A. , Stoica I. , &Zaharia M. , Above the Clouds: A view of cloud computing, [UC Berkeley Reliable Adaptive Distributed systems Laboratory (RAD Lab)]
  • Cloud computing - Wikipedia, the free encyclopedia. mht
  • Chen Y. , Paxson V. & Katz R. H. , What's new about cloud computing security?, [CS Division, EECS Dept. UC Berkeley], 2010
  • Casola V. , Rak M. & Villano U. , Identity federation in cloud computing, [Dipt. di Inf. e Sist. , Univ. degliStudi di Napoli Federico II, Naples, Italy], IEEE, 2010
  • Depena R, Cloud Computing Companies to Watch in 2011 (2010 was certainly an exciting year in the Cloudsphere).
  • Figure 1: Simple flow of Cloud Computing Infrastructure (Source: RAD Lab)
  • Figure 2: Cisco Secure Cloud Data Center Framework [source: www. cisco. com], Cisco Cloud Computing - Data Center Strategy, Architecture, and Solutions Point of View White Paper [for U. S. Public Sector], 1st Edition.
  • Figure 3: Cloud Computing sample architecture to understand cloud architecture [Source: cloud computing, Journal of Computing]
  • Guha R. , Kumar R. , Raghavan P. & Tomkins A. , Propagation of Trust and Distrust, [IBM Almaden Research Center], 2004
  • Guo H. , Wu W. , Wang W. & Chen J. , Personalization as a service: the architecture and a case study, [EMC Research China, Fudan Univerisity], 2009
  • Han-zhang W. & Liu-sheng H. , An improved trusted cloud computing platform model based on DAA and privacy CA scheme, [Dept. of Comput. Sci. & Technol. , Univ. of Sci. & Technol. of China, Hefei, China], 2010
  • Hwang K. & Li D. , Trusted Cloud Computing with Secure Resources and Data Coloring, [Univ. of Southern California, Los Angeles, CA, USA]
  • Habib S. M. , Ries S. & Mühlhäuser M. , Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation, [Xi'an, China], 2010
  • Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-Based Platforms, Enomaly Elastic Computing Platform, [Service Provider Edition]
  • Jennings R. , How DevOps brings order to a cloud-oriented world, [searchCloudComputing. com]
  • JERICHO, Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration, V1. 0 (Position Paper). Jericho Forum, 2009
  • Knorr E. & Gruman G. , What cloud computing really means,[InfoWorld],link: http://www. infoworld. com/d/cloud-computing/what-cloud-computing-really-means-031
  • Krautheim, F. J. Private Virtual Infrastructure for Cloud Computing. 2009
  • Li X. ; Zhou L. ; Shi Y. & Guo Y. , A trusted computing environment model in cloud architecture, [Beijing Jiaotong Univ. , Beijing, China], 2010
  • Luo M. ; Zhang L. & Lei F. , AnInsuanrance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing, [IEEE], 2010
  • Mojica M. , Stephenson J. & Healey A. , Six questions every retail executive should ask about cloud computing, [Accenture]
  • Mirashe S. P. & Dr. Kalyankar N. V. , Cloud Computing, Journal of computing, volume 2, issue 3, March 2010
  • Pandit M. , Scalable Computing Programme Newsletter, [Digital Systems KTN], 3rd Edition, June 2010Ragnet F. , Can You Trust the Cloud? A Practical Guide to the Opportunities and Challenges Involved in Cloud Computing, [Xerox]
  • Ranchal R. , Bhargava B. , Othmane L. B. , Lilien L. , Kim A. , Kang M. &Linderman M. ; Protection of Identity Information in Cloud Computing without Trusted Third Party, [Purdue University], [Western Michigan University], [Naval Research Laboratory], [Air Force Research Laboratory], USA
  • Shimba F. , Cloud Computing: Strategies for Cloud Computing Adoption, Dublin Institute of Technology, 2010
  • Shields G. , Can you trust your public cloud provider? searchCloudComputing. com
  • Siemens IT Solutions and Services, Community Clouds – supporting business ecosystems with cloud computing
  • Santos, N. , Gummadi, K. P. , et al. Towards Trusted Cloud Computing. Planc Institute for Software Systems, 2009
  • Shen Z. , Li L. , Yan F. & Wu X. , Cloud Computing System Based on Trusted Computing Platform, [State Key Lab. of Software Eng. , Wuhan Univ. , Wuhan, China], 2010
  • Website: www. salesforce. com, copyright 2000-2012
  • Wu J. Y. , Shen Q. L. , Zhang J. L. & Xie Q. , Cloud Computing: Cloud Security to Trusted Cloud, [2011, Advanced Materials Research, 186, 596]
  • Xiong L. & Liu L. , PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Computer Society
  • Yachin D. , Israel Software Industry Review: Addressing Cloud Computing Challenges, February 2010
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cloud Computing Identity Management Architectural Framework Trusted Cloud

Powered by PhDFocusTM