Cloud Computing Environments

Cloud Computing Environments

Ashley Matteson (Coventry University, UK)
Copyright: © 2015 |Pages: 11
DOI: 10.4018/978-1-4666-5888-2.ch100
OnDemand PDF Download:
$30.00
List Price: $37.50

Chapter Preview

Top

Background

Cloud Computing Environments have their roots in Service Oriented Architecture (SOA), Data Centers, Virtualization Technology, and even Green Computing. SOA was popular by providing service choices to end-users that were available from the provider often in a single location simply by the click of a mouse button. A SOA framework operates by calling the application or service from wherever it was residing and instantly delivering it to the end-user. For this to be possible techniques such as virtualization were employed.

Key Terms in this Chapter

Cryptography: A mathematical system of encryption by which codes are created using a key and cypher both of which are required to decipher, decode, or break the encryption so that the information can be read by human or machines.

Cyber-Attack: An attempt by an advisory to breach the security of an information system, file, service or IT asset to gain unauthorized access to its content resulting in having the ability to compromise integrity of the system, file, service or IT asset potentially causing damage or harm to the compromised asset, organization or individual.

Audit and Logging: The act of recording events or other changes of environment in the status of files, systems or services whether virtual or physical set by policy from a default application setting or administrator customization.

Business Case: Presentation of facts and figures supporting the case of a desired outcome to senior decision makers usually for the purchase of some new equipment, major organizational change or other significant decision.

Service Oriented Architecture (SOA): An architecture that makes available multiple applications or services to end-users on a single physical appliance such as a dashboard or portal using virtualization software and services.

Cloud Computing Environments: Models for Service and Deployment of Clouds selected by IT Decision makers based on the requirements of their deployment environment..

Generic Mainframe and Server Deployment: A basic model or framework often used by companies or organization building and deploying a traditional IT environment which consists of high performance hardware to include but not limited to servers and mainframe computers that will support and serve data and information to their connected computer networks.

Traditional IT: An information technology environment historically used for hosting data, services or applications that are owned, controlled, operated and managed by the same organization or individual such as a data center, server farm, mainframe or supercomputer or other non-cloud computing based IT solutions.

Cloud Adopters: Any entity or individual that selects and implements a Cloud Computing Environment to assist in meeting their information technology needs.

Cloud Computing Security: Methods and techniques used by information technology professionals, cloud users and cloud security tools to lock-down Cloud Computing Environments to authorized users only and mitigate threats from inside and outside sources thus protecting information technology systems, files, services or assets within that cloud from cyber attack.

Complete Chapter List

Search this Book:
Reset