Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management

Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management

Shweta Kaushik (Jaypee Institute of Information Technology, India) and Charu Gandhi (Jaypee Institute of Information Technology, India)
Copyright: © 2019 |Pages: 25
DOI: 10.4018/978-1-5225-7149-0.ch002

Abstract

Cloud computing has started a new era in the field of computing, which allows the access of remote data or services at anytime and anywhere. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. The scalability feature of cloud computing allows one to expand and contract the resources. The owner's data stored at the remote location, but he is usually afraid of sharing confidential data with cloud service provider. If the service provider is not the trusted one, there may be a chance of leakage of confidential data to external third party. Security and privacy of data require high consideration, which is resolved by storing the data in encrypted form. Data owner requires that the service provider should be trustworthy to store its confidential data without any exposure. One of the outstanding solutions for maintaining trust between different communicating parties could be the service level agreement between them.
Chapter Preview
Top

Introduction

Cloud Computing

Cloud computing can be defined as on-demand delivery of computer resources such as database storage, computer power, applications and other IT services over the internet by cloud service provider with pay-as-you-go pricing technique. A user can acquire the resources as per the needs at anytime and anywhere (24x7) by just connecting with the internet. It enables the various companies to consume the required resources such as storage, application and virtual machines as utility, like electricity, without its computing infrastructure construction and maintenance in house.

Need of Cloud Computing

  • 1.

    Flexibility: Cloud-based services are perfect for organizations with developing or fluctuating data transfer capacity requests. In the event that your needs increment it's easy to scale up your cloud limit. In like manner, on the off chance that you have to downsize once more, the adaptability is prepared into the administration. This level of agility can give organizations utilizing cloud computing a genuine advantage over competitors.

  • 2.

    Disaster Recovery: Organizations of all sizes choose to put resources into strong disaster recovery, however for littler organizations that do not have the required money and ability, this is regularly more a perfect than the truth. Cloud is presently helping more associations resist that pattern. As indicated by Aberdeen Group, private companies are twice as likely as bigger organizations to have actualized cloud-based reinforcement and recovery arrangements that spare time, keep away from huge in advance venture and move up outsider skill as a feature of the arrangement.

  • 3.

    Automatic Software Updates: The beauty of cloud computing is that the servers are off-premise from end user. Service provider take care of them for you and roll out regular software updates – including security updates – so you don’t have to worry about wasting time maintaining the system yourself. It will leave the end user free to focus on the things related to the software updates.

  • 4.

    Capital-Expenditure Free: Cloud computing cuts out the high cost of hardware purchase and management for any service user. You simply pay as you go and enjoy a subscription-based model that’s kind to your cash flow.

  • 5.

    Increased Collaboration: At the point when your groups can get to, alter and share reports whenever, from anyplace, they're ready to accomplish all the more together, and improve. Cloud-based work process and document sharing applications enable them to make refreshes continuously and gives them full visibility of their joint efforts.

  • 6.

    Work From Anywhere: With cloud computing, in the event that you have a web association you can be grinding away. What's more, with most genuine cloud administrations offering portable applications, you're not limited by which gadget you must hand. Organizations can offer more adaptable working advantages to employees so they can appreciate the work-life adjust that suits them – without profitability enduring a shot.

  • 7.

    Security: Lost workstations/ laptop are a billion dollar business issue. Also, possibly more significant than the loss of a costly bit of pack is the loss of the subtle information inside it. Cloud computing gives you more significant security when this happens. Since your information is put away in the cloud, you can get to it regardless of the end result for your machine. What's more, you can even remotely wipe information from lost PCs so it doesn't get into the wrong hands

  • 8.

    Competitiveness: Moving to the cloud offers access to big business class innovation, for everybody. It likewise enables littler organizations to act speedier than enormous, built up contenders. Pay-as-you-go administration and cloud business applications mean little outfits can keep running with the enormous young men, and upset the market, while staying lean and deft.

Figure 1.

Need of cloud computing

978-1-5225-7149-0.ch002.f01

Cloud Entities

In cloud computing the various entities according to their data usage and responsibility can be categorized as shown in figure 2:

  • 1.

    Data Owner: These are those entity who want to store their data on the cloud storage and further share it with other entity according to their access criteria defined by data owner. It release itself from any data storage, management, distribution and security assurance, as after storing the data over cloud storage these all task are handled by the service provider only. Data owner can also keep track of the security for its data by auditing timely and make sure that integrity of its data is either maintained or not. This entity is also responsible for updating any data or service at service provider end also, if occur. Since, service provider is an external un-trusted party; therefore, owner will always stored their data in encrypted format.

  • 2.

    Cloud Service Provider (CSP): This entity is responsible for handling the data which includes data storage, management, distribution, security maintenance and updating the data if suggested by the data owner. CSP is totally responsible for all the task related to data and releases the owner from any concern. CSP will provide the data to the end users only after verifying their authenticity and access capability as defined by the data owner. As data is stored in encrypted format, CSP will not be able to know exactly what data is stored. Apart from all these, CSP will also responsible for storing redundant copy of the same data in order to avoid single point of failure.

  • 3.

    End User: These are those entities who wants to access the data owner data or services stored at service provider end. These entity will not directly contact the owner for acquiring any service, instead they contact with service provider for accessing any data or service. Since data is encrypted format, end users are also provided with decryption key to get back the original data from the received one.

Figure 2.

Cloud entities

978-1-5225-7149-0.ch002.f02

Complete Chapter List

Search this Book:
Reset