Skip to main content

Cloud Computing Technology and Security

  • Chapter
  • First Online:
Book cover Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 192k Accesses

Abstract

Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology going beyond the client-server technology. It is a technology extending the realms of a computer network creating an environment that offers scalability, better utilization of hardware, on-demand applications and storage, and lower costs over the long run through the creation of virtual servers cloned from existing instances each offering near instantaneous increase in performance, allowing companies to react quickly and dynamically to emerging demands. The “cloud” or “cloud solution,” as the technology is commonly referred to, can either be hosted on-site by the company or off-site such as Microsoft’s SkyDrive and Samsung’s S-Cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell P, Grance T. The NIST definition of cloud computing, NIST special publication 800–145. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

  2. Metzler J, Taylor S. The data center network transition: wide area

    Google Scholar 

  3. Networking Alert. Network World, August 08, 2011. http://www.networkworld.com/newsletters/frame/2011/080811wan1.html?source=nww_rss

  4. Mell P, Grance T. Effectively-and-securely-using-the-cloud-computing-paradigm. http://www.scribd.com/doc/13427395/

  5. Greenpeace. Make IT Green: cloud computing and its contribution to climate change, Greenpeace, USA. http://www.greenpeace.org/international/Global/international/planet-2/report/2010/3/make-it-green-cloud-computing.pdf

  6. Koomey J. The environmental cost of cloud computing: assessing power use and impacts. http://www.slideshare.net/gigaom/jonathan-koomey-the-environmental-cost-of-cloud-computing

  7. Climate Group and the Global e-Sustainability Initiative (GeSI). SMART 2020: enabling the low carbon economy in the information age. http://gesi.org/article/43

  8. Azure Security Center. https://azure.microsoft.com/en-us/services/security-center/

  9. Larry Dignan Virtualization: what are the security risks? http://www.zdnet.com/article/virtualization-what-are-the-security-risks/

  10. Bob Violino. Five cloud security trends experts see for 2011. http://www.csoonline.com/article/647128/five-cloud-security-trends-experts-seefor-2011

  11. Goldberg RP (1973) Architectural principles for virtual computer systems. Harvard University, Cambridge, MA, pp 22–26

    Google Scholar 

  12. Wikipedia. http://en.wikipedia.org/wiki/Hypervisor

  13. MacDonald N (2011) Yes, hypervisors are vulnerable, January 26, 2011. http://blogs.gartner.com/neil_macdonald/2011/01/26/yes-hypervisors-are-vulnerable/

  14. King ST, Chen PM, Wang YM, Verbowski C, Wang HJ, Lorch JR (2006) SubVirt: implementing malware with virtual machines. http://web.eecs.umich.edu/~pmchen/papers/king06.pdf

  15. Elastic Load Balancing, AWS. http://aws.amazon.com/elasticloadbalancing/

  16. Global Information Assurance Certification Paper. https://www.giac.org/paper/gsna/119/ids-load-balancer-security-audit-administrators-perspective/103792

  17. Wikipedia. http://en.wikipedia.org/wiki/Cloud_computing. Authenticate to the Rackspace Cloud. https://developer.rackspace.com/docs/cloud-files/v1/getting-started/authenticate/#authenticate-to-cloud

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Cloud Computing Technology and Security. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics