Abstract
Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology going beyond the client-server technology. It is a technology extending the realms of a computer network creating an environment that offers scalability, better utilization of hardware, on-demand applications and storage, and lower costs over the long run through the creation of virtual servers cloned from existing instances each offering near instantaneous increase in performance, allowing companies to react quickly and dynamically to emerging demands. The “cloud” or “cloud solution,” as the technology is commonly referred to, can either be hosted on-site by the company or off-site such as Microsoft’s SkyDrive and Samsung’s S-Cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell P, Grance T. The NIST definition of cloud computing, NIST special publication 800–145. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Metzler J, Taylor S. The data center network transition: wide area
Networking Alert. Network World, August 08, 2011. http://www.networkworld.com/newsletters/frame/2011/080811wan1.html?source=nww_rss
Mell P, Grance T. Effectively-and-securely-using-the-cloud-computing-paradigm. http://www.scribd.com/doc/13427395/
Greenpeace. Make IT Green: cloud computing and its contribution to climate change, Greenpeace, USA. http://www.greenpeace.org/international/Global/international/planet-2/report/2010/3/make-it-green-cloud-computing.pdf
Koomey J. The environmental cost of cloud computing: assessing power use and impacts. http://www.slideshare.net/gigaom/jonathan-koomey-the-environmental-cost-of-cloud-computing
Climate Group and the Global e-Sustainability Initiative (GeSI). SMART 2020: enabling the low carbon economy in the information age. http://gesi.org/article/43
Azure Security Center. https://azure.microsoft.com/en-us/services/security-center/
Larry Dignan Virtualization: what are the security risks? http://www.zdnet.com/article/virtualization-what-are-the-security-risks/
Bob Violino. Five cloud security trends experts see for 2011. http://www.csoonline.com/article/647128/five-cloud-security-trends-experts-seefor-2011
Goldberg RP (1973) Architectural principles for virtual computer systems. Harvard University, Cambridge, MA, pp 22–26
Wikipedia. http://en.wikipedia.org/wiki/Hypervisor
MacDonald N (2011) Yes, hypervisors are vulnerable, January 26, 2011. http://blogs.gartner.com/neil_macdonald/2011/01/26/yes-hypervisors-are-vulnerable/
King ST, Chen PM, Wang YM, Verbowski C, Wang HJ, Lorch JR (2006) SubVirt: implementing malware with virtual machines. http://web.eecs.umich.edu/~pmchen/papers/king06.pdf
Elastic Load Balancing, AWS. http://aws.amazon.com/elasticloadbalancing/
Global Information Assurance Certification Paper. https://www.giac.org/paper/gsna/119/ids-load-balancer-security-audit-administrators-perspective/103792
Wikipedia. http://en.wikipedia.org/wiki/Cloud_computing. Authenticate to the Rackspace Cloud. https://developer.rackspace.com/docs/cloud-files/v1/getting-started/authenticate/#authenticate-to-cloud
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Cloud Computing Technology and Security. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)