Advertisement

Introduction

  • Naresh Kumar Sehgal
  • Pramod Chandra P. Bhatt
  • John M. Acken
Chapter

Abstract

In this chapter, we review the motivation and make an economic case for Cloud Computing. Then we introduce NIST definitions for different types of Cloud Computing services and explain the contemporary needs and trends in the marketplace. These include an introduction to basic information security needs, edge computing, and IOT trends. We wrap up the chapter by defining the organization of rest of the book and an overview of other chapters.

References

  1. 1.
    Mell, P., & Grance, T. (2009). The NIST definition of Cloud Computing (Version 15 ed.). Available: http://csrc.nist.gov/groups/SNS/Cloud-computing/Cloud-def-v15.doc.
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of Cloud Computing. ACM Communications, 53, 50–58.CrossRefGoogle Scholar
  3. 3.
    Ramgovind, S., Eloff, M.M., & Smith, E.. (2010). The management of security in Cloud computing. Information Security for South Africa (ISSA), Sandton, South Africa, pp. 1–7.Google Scholar
  4. 4.
    Vasan, A., Sivasubramaniam, A., Shimpi, V., Sivabalan, T., & Subbiah, R. (2010). Worth their Watts? – an empirical study of datacenter servers. In High Performance Computer Architecture (HPCA), IEEE 16th International Symposium, Bangalore, India, pp. 1–10.Google Scholar
  5. 5.
    OProfile. Available: http://oprofile.sourceforge.net.
  6. 6.
    Fowler, G. A., & Worthen, B. (2009). Internet industry is on a Cloud — whatever that may mean. Available: http://online.wsj.com/article/SB123802623665542725.html.
  7. 7.
    Kaufman, L. M. (2010). Can public-cloud security meet its unique challenges? IEEE Security & Privacy, 8, 55–57.CrossRefGoogle Scholar
  8. 8.
    Anthes, G. (2010). Security in the Cloud. ACM Communications, 53, pp. 16–18.Google Scholar
  9. 9.
    Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D., & Zamboni, D. (2009). Cloud Security is not (just) virtualization security: A short chapter. Proceedings of the 2009 ACM workshop on Cloud Computing Security, pp. 97–102. Chicago.Google Scholar
  10. 10.
    Soundararajan, G. & Amza, C. (2005). Online data migration for autonomic provisioning of databases in dynamic content web servers. Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, Toronto, pp. 268–282.Google Scholar
  11. 11.
    Nicolas, P. Cloud Multi-tenancy. Available: http://www.slideshare.net/pnicolas/Cloudmulti-tenancy.
  12. 12.
    Bun, F. S. (2009). Introduction to Cloud Computing, presented at the Grid Asia.Google Scholar
  13. 13.
  14. 14.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Naresh Kumar Sehgal
    • 1
  • Pramod Chandra P. Bhatt
    • 2
  • John M. Acken
    • 3
  1. 1.Data Center GroupIntel CorporationSanta ClaraUSA
  2. 2.Computer Science and Information Technology ConsultantRetd. Prof. IIT DelhiBangaloreIndia
  3. 3.Electrical and Computer EngineeringPortland State UniversityPortlandUSA

Personalised recommendations