Head for the clouds, feet firmly on the ground

Mar 05, 2012

Computer engineers in the US writing in the International Journal of Communication Networks and Distributed Systems have reviewed the research literature to get a clear picture of cloud computing, its adoption, use and the security issues it faces.

Cloud computing is the use of remote computers accessed via the Internet to store, manage, and process data. The concept allows users to use their data from anywhere with internet access rather than relying on being able to connect to local computers or servers. Web-based email, media streaming systems, online and backup, content delivery networks for websites and blogs and many other functions are now available as cloud computing applications and services.

Cloud computing, however, is still in its and is evolving rapidly as new services come and go and offer individual users and companies new ways to work with their data and networks. As this cloud computing moves forward there is the ubiquitous issue of privacy and security to consider and how they are in some quarters holding back more widespread adoption.

Joseph Idziorek and Mark Tannian of the Department of Electrical and , at Iowa State University in Ames, have considered six essential aspects of security, as defined by veteran researcher Donn Parker, in the context of cloud computing. These are:

  • Confidentiality (data kept secret)
  • Integrity (data unaltered without permission)
  • Availability (data accessible to those authorized to use it)
  • Utility (data can be processed by those authorized to access it)
  • (validation that data is genuine)
  • Possession (authorized users have full control over their data)
The researchers suggest that in theory cloud computing users must take into account all six security elements when choosing to use such services, but in practice users decide on the priority of each depending on their personal needs. It is perhaps deficits, real or perceived, in one or more of these six areas that dissuades some from adopting cloud computing whereas the early adopters recognize that such systems are ever-changing and may never be perfect. As with much in life it is a case of weighing up the pros and cons and reaching a compromise to make the most of the tools available or in the opposite sense to choose not to use those tools at all and to adhere to the standard computing paradigm. Fundamentally, those with their head the clouds can still keep their feet firmly on the ground and vice versa.

Explore further: Forging a photo is easy, but how do you spot a fake?

More information: "Security analysis of public cloud computing" in Int. J. Communication Networks and Distributed Systems, 2012, 9, 4-20.

add to favorites email to friend print save as pdf

Related Stories

Final version of NIST cloud computing definition published

Oct 26, 2011

After years in the works and 15 drafts, the National Institute of Standards and Technology's (NIST) working definition of cloud computing, the 16th and final definition has been published as The NIST Definition of Cloud Computing ...

Recommended for you

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

Nov 21, 2014

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

(Phys.org) —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

Converting data into knowledge

Nov 17, 2014

When a movie-streaming service recommends a new film you might like, sometimes that recommendation becomes a new favorite; other times, the computer's suggestion really misses the mark. Yisong Yue, assistant ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.