Abstract: models under cloud computing facilitate various levels
May 25, 2019
Abstract: Cloud computing is a new computing model which is widely emerging technology in the recent years is adopted by most of the IT companies and other organizations. The providers are typically offering customers cloud computing varying information systems services. The cloud services consist of different functionalities at varying costs, and varying reliability. Cloud Computing has lots of distinct properties that make it very important. Privacy seems to be a unique concern in cloud .Various types of service models under cloud computing facilitate various levels of privacy services. We will get the minimum security in IaaS (Infrastructure as a Service) and most with a SaaS provider. In this paper, we will focus upon the reviewing and understanding cloud resources to implement them in a optimize way.Keywords: Cloud Computing, Iaas, SaaS, Internet of Things, Fog Computing 1. IntroductionCloud in simple word as we all understand is “storage and computing of data on the online server”. Actually there is nothing like “cloud”, it’s just a metaphor which symbolize the online or remoteness in the digital world. It is referred so by programmer and developer around the world to show the intermediate medium in any network. Cloud does not exist in real but is a representation of the pool of resource used in the network to process any data.Cloud Computing has all the feebleness associated with these internet utilization and the extra threats arise from the combined, Virtualized and redistributed resources. There are many data privacy concerns in cloud computing. Incorrect revelation of a data used in businesses in cloud to third parties is one of the major issues that have been found. Encryption should be properly used and the crypto algorithms include AES, RSA, DES and 3 DES 1.Cloud Computing and storage gives the ability to share the resources and reallocate it dynamically. Cloud computing and cloud storage are two stages of the same process. We can relate them with “to process us need data, and processed data we need to store somewhere”. So having both computation and storage at a place (in single system) reduce the network traffic to access a resource stored at the remote server. Storing whole data at a single place practically reduce half of the traffic. The cloud computing and storage serve the backbone for the IOT. And therefore word “Cloud” hold a deep meaning inside it, in all domains.2. IOTCloud computing has evolved to greater stage as we expected in very less time. IoT is now an application or side version of cloud computing. IoT provide interface to the user and consumer through cloud computing. Internet of things is nothing but a concept where the entire electronics devices are trying to connect to internet 2. Cloud computing provide virtually unlimited computational capability to the device.IoT is basically a Private network and therefore it is not directly a part of open Cloud but can accessprivate and hybrid cloud for the resources. Cloud based computing reduce the overhead of the device andreduce on-chip storage. We can treat cloud as virtual system which can interface any kind of device andprocess its request. Cloud provides direct storage on the server of the host. Sensor nodes in the IoT candirectly access cloud storage to store their data on the servers.As per basic definition we can state, Cloud computing is a concept of using network of remote server hosted on internet to store, manage and process user’s data, rather than local server or a PC to perform such functions. But if we are integrating Cloud computing and IoT, we need to change some terminology. When IoT is used on cloud a new concept of networking is generated 1.IoT is network based on WSN. If WSN have the access to store, manage and process the data through internet, then it must use Cloud. Since the IoT access a private network it needs to be protected on the cloud, which is shared network, so that only limited or privileged user /device can use the resource shared by the IoT WSN. With the advancement of 4G-LTE cellular network and Wi-Fi, the IoT is growing with a faster rate. And therefore can access Cloud server more easily and securely.The collective usage of Cloud and IoT gives a brand new domain of research known as “Fog Computing” also called as “Fogging”. It is a distributed computing infrastructure. Fog sometimes also comes by the name of “Cisco fog computing”, as it a registered name by Cisco. The word Fog conveys meaning of localized cloud which provides faster access by staying closer to the data source.2.1. Fog ComputingThe term “Fog computing” was introduced by Professor Salvatore J. Stolfo. The Fog computing is a side version or an improved version of cloud which does not deal with the centralisation but focus mainly on the localization of the resources.Fog computing is advance concept of sharing IoT on a Cloud, where some application run at client or IoT nodes and some run as cloud servers. Fog computing decentralize the cloud computing concept and emphasise on the end-user or client objective rather than sharing the resources. It dynamically checks the density of traffic and route it to provide quality of service (QoS) 3. The concept is still not yet developed fully or commercially. The concept perceived both large cloud systems and big data structures based servers making it compatible with the existing network of both virtual and real devices.Fog computing is kind of a new breed of cloud computing which not only connect the cloud but also provide connectivity to the IoT network. Its main aim is to reduce the amount of the data transported to and back from the cloud server 2. It also increases the efficiency and reduces the rate of transfer. In fogging most of the data processing will done at node end or client side in a gateway system.This distributed approach is growing because of the wide acceptability of the IoT. Since the amount of nodes and data handled by the WSN is enormous it needs to be processed and standardized at the node itself in order to store at cloud. This method not only reduces the amount of data but also reduce the timeto access the data from cloud. Computations done at client server or localized server reduce the need of storing the data at the Centralised server. User can directly access any info from localized server.3. Cryptography: Security principlesCryptography can help dawning integration of Cloud Computing by increased number of privacy related companies. The primary level of privacy where cryptography can help Cloud computing is safe and secure storage. Cryptography is the science of storing messages securely by converting the raw data into forms which is not readable. In today’s world, cryptography is considered as a collection of three algorithms. These algorithms are Symmetric-key algorithms, Asymmetric key algorithms and Hashing. In Cloud computing, the main problems are related to problem in data security, backup data, network traffic, file storage system, and security of host and cryptography alone can solve these issues to extents. For a safe and secure communication between the guest domain and the host domain, or from hosts to management systems, encryption technologies, such as Secure HTTP, encrypted VPNs, TLS, Secure Shell, and so on should be used 3. Encryption will help us prevent such exploits like man-in-the middle, spoofed attacks, and session hijacking. Cloud computing provides clients with a computing facilities or infrastructure on top of which they can store data and run applications. While the advantages of cloud computing are pretty clear, it introduces new security challenges as cloud operators are supposed to manipulate data for clients without necessarily being fully trusted. We will be trying to design cryptographic primitives and protocols which are tailored to the setting of cloud computing, attempting to strike a balance between security, efficiency and functionality. Cloud data storage enhances the risk of leakage of data and does not give access to unauthorized users. Cloud data management cannot be fully trusted by data owners. Cloud data process and computation could expose the privacy of users, owning the data or related entities to parities which does not have unauthorized access. For overcoming the above problems, cryptography has been widely applied to ensure data security, privacy and trust in cloud computing. 4. IOT and CloudIoT and Cloud are coupled together to form a unit which will form chain of network. The preference to localized server than centralised server will reduce the rate of data transfer. Special purpose cloud server can be implemented by the use to access the information store by the IoT nodes. These clouds will gather and distribute the info faster and secure. The good thing about integrating IoT with Cloud is that we can practically connect “anything” to the internet which can either process or gather data 4.Cloud hold and delivers the resources on demand over the Internet as a Service (IaaS). Cloud computing process the data as Software as a Service (SaaS). Both these can be utilised to make a smart environment. So many tools are available in the open source which provides the capability to configure the IoT based on Cloud. Some of those are IoT by Oracle, Blue Mix by IBM, SAP IoT, Open Remote, ioBridge and lot more. These can be used to configure the IoT and we need separately implement the gateway to handle the access to store and process the data.IoT and cloud are changing the face of normal internet usage by the human kind. Most of the Enterprise and Business are converting their resources into Cloud and IoT based. This increases the productivity of the company and also helps them reduce and smartly configure their resources. The number is increasing day after day.5. ResultsWe have presented an approach for implementation and evaluation of a resource management system for cloud computing services. Cloud computing is growing as a new thing and it is the new trend indeed and many of the organizations and big companies are moving toward the cloud but lagging behind because of some security problems. Much of the work has focused on creating standards and describes ways of designing and building clouds. We were surprised so far not to see significant contributions to the usage and scaling properties of IOT, which is a new programming paradigm in the cloud. The technical aspects of cloud computing that were reviewed included the costs of using and building clouds, the security, legal and privacy implications that cloud computing raises as well as the effects of cloud computing on the work of IT departments. The technological aspects that were reviewed included standards, lessons from related technologies, building clouds, and use-cases that presented new technological possibilities enabled by the cloud.6. References1 Sanjoli Singla, Jasmeet Singh ,”Cloud computing security using encryption technique”, IJARCET, vol.2, ISSUE 7.2 Karun Handa, Uma Singh,” Data Security in Cloud Computing using Encryption and Steganography”, International Journal of Computer Science and Mobile Computing”, Vol.4 Issue.5, May-2015, pg.786-791.3 Rishav Chatterjee, Sharmistha Roy, “Cryptography in Cloud Computing: A Basic Approach to Ensure Security in Cloud”, Volume 7 Issue No.5. 4 Eli WEINTRAUB, Yuval COHEN,”Multi Objective Optimization of Cloud Computing Services for Consumers”, IJACSA, Vol. 8, No. 2, 2017.