Cloud Computing: Privacy, Mobility and Resources Utilization

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-41 Number-1
Year of Publication : 2016
Authors : Tariq Alwada’n, Omar Al-Zitawi, Jalal Omer Atoum
DOI :  10.14445/22312803/IJCTT-V41P106

MLA

Tariq Alwada’n, Omar Al-Zitawi, Jalal Omer Atoum "Cloud Computing: Privacy, Mobility and Resources Utilization". International Journal of Computer Trends and Technology (IJCTT) V41(1):29-36, November 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The fascinating world of Cloud computing has definitely changed the way of using computers and the Internet. The impact it has left so far on how IT and business services are delivered and managed is undeniable. However, the evolutionary change that Cloud computing has left on the IT landscape has given rise to a range of concerns by Cloud providers and customers. The current study introduces and examines two major problems in Cloud computing system. The first one is the Cloud internal and external data security and client’s privacy, and the tasks mobility and resources utilization. The study also provides practical solutions to the two aforementioned problems and a prototype, called SPI, which has been successfully tested. The present study suggests using SSL with proxy server and secured access to members control panel for Cloud external data security. As for internal security and client’s privacy, multiple approaches have been applied.

References
[1] M. Rouse. What is public cloud. Retrieved from Whatis.com. (2014, October 12).
[2] Cisco Systems. Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models. White Paper.(pp. 10), 2010
[3] S.Ahmed and S. Maria. Cloud Computing: Paradigms and Technologies. F. Xhafa and N. Bessis (eds.), Inter-cooperative Collective Intelligence: Techniques and Applications, Studies in Computational Intelligence 495.
DOI: 10.1007/978-3-642-35016-0_2, Springer-Verlag Berlin Heidelberg, 2014.
[4] C. Y. R Buyya. Vision, hype and reality for delivering computing as 5th utility . In Cloud computing and emerging IT platforms, 2009.
[5] T.Alwada’n. Security for Mobile Grid Systems. PhD Thesis. School of Computing, De Montfort. (pp. 26-28), 2012.
[6] T.Athanaileas. An agentbased framework for integrating mobility into grid services. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE Operating Systems, and Applications (pp. 31:1-31:6). Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2007.
[7] S.Wong and K.Ng. Performance evaluation of mobile grid services. Proceedings of the 2nd KES International conference on Agent and multiagent systems: technologies and applications (pp. 557-566). Berlin, Heidelberg: Springer-Verlag, 2008.
[8] J.Stamos, and D. Gifford. Remote evaluation. ACM Transactions on Programming Language and Systems, (pp 537-565), 1990.
[9] C.B.Westphall, and C. Westphall. Management and security for grid, cloud and cognitive networks. Revista de Sistemas de Informao da FSMA 8, (pp. 8-21), 2011.

Keywords
Cloud computing, privacy, mobility, IaaS, Saas, PaaS, SPI.