Foundations of Cloud Computing and Information Security
This is a foundational chapter, looking at the historical evolution of various networking and computing technologies that led to Cloud Computing. This is a must-read chapter for people not familiar with the past trends and progress that led us from large mainframe computers to PCs and now back to large data centers hosting Cloud Computing servers. In parallel, there was a significant progress made in enterprise IT, web services, and service-oriented architecture (SoA).
We present a historic computing spiral, showing that industry has oscillated between large central computers, to localized computing and hybrid models leading back to the spiral growth. This requires large central computers to handle the distributed edge computing demand.
We will review and compare top-down vs. bottom-up SoA solution approaches and implementation of private and hybrid Cloud. We end this chapter by visiting the information security basic concepts, an example of a security attack and cloud software security requirements.
- 6.Bhatt, Pramod Chandra P, “An Introduction to Operating Systems Concepts and Practice (GNU/Linux)”, PHI Learning Pvt Ltd, Jan 1, 2014.Google Scholar
- 9.Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014). Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It. Bloomberg Businessweek. Retrieved from http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data.
- 24.Krutz, R. L., & Vines, R. D. (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis: Wiley Publishing.Google Scholar
- 28.Https://www.financialsense.com/contributors/guild/cybercrime-s-global-costsGoogle Scholar