Advertisement

Storage and Processing of Data and Software Outside the Company in Cloud Computing Model

  • Aneta Poniszewska-MarandaEmail author
  • Michal Grzywacz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9228)

Abstract

In the modern world there exists many solutions for storing and processing of data outside the company. However, despite the fast development of many outsourcing technologies, especially cloud computing, still there are many problems and barriers connected with provisioning of data storage and processing to the third parties. The paper presents Extendable Software as a Service (ESaaS) cloud solution to allow customer to store and process data and their software using external provider, with keeping control over the algorithms and methods used for processing this data.

Keywords

Cloud Computing Cloud Model Base Application Cloud Usage Cloud Application 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Recommendation of NIST (2011)Google Scholar
  2. 2.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1–11 (2011)CrossRefGoogle Scholar
  3. 3.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A View of Cloud Computing. Communications of the ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  4. 4.
    Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, Inc., New York (2010)Google Scholar
  5. 5.
    Poniszewska-Maranda, A.: Selected aspects of security mechanisms for cloud computing - current solutions and development perspectives. Journal of Theoretical and Applied Computer Science 8(1), 35–49 (2014)Google Scholar
  6. 6.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  7. 7.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583–592 (2012)CrossRefGoogle Scholar
  8. 8.
    Sosinsky, B.: Cloud computing Bible. Wiley Publishing Inc. (2011)Google Scholar
  9. 9.
    Hayes, J.: Storage outsourcing renaissance. Engineering and Technology Magazine, October 2009Google Scholar
  10. 10.
    Ahson, S.A., Ilyas, M.: Cloud Computing and Software Services. Theory and Techniques. CRC Press (2011)Google Scholar
  11. 11.
    Ring, K.: Time to outsource data storage. ComputerWeekly.comGoogle Scholar
  12. 12.
    Hausman, K., Cook, S.L., Sampaio, T.: Cloud Essentials. John Wiley and Sons (2013)Google Scholar
  13. 13.
    Perry, R., Hatcher, Mahowald, R.P., Hendrick, S.D.: Force.com Cloud Platform Drives Huge Time to Market and Cost Savings, IDC (2009)Google Scholar
  14. 14.
    Shroff, G.: Enterprise Cloud Computing. Technology, Architecture, Applications. Cambridge University Press, Cambridge (2012) Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Institute of Information TechnologyLodz University of TechnologyłódźPoland

Personalised recommendations