A Security approach for Data Migration in Cloud
Computing
Virendra Singh Kushwah*, Aradhana Saxena**
*
Assistant Professor, Department of Computer Science, HIMCS, Mathura
**
Assistant Professor, Department of Computer Science, RJIT, Gwalior
Abstract-- Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to move their data and applications to the cloud. I justify the importance and motivation of security in the migration of legacy systems and I carry out an approach related to security in migration processes to cloud with the aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems.
Index Terms-- Security; Cloud Computing; Data Migration; Encryption
I.
1.
BACKGROUND
Overview of Cloud Computing
Cloud computing services such as Amazon EC2 and Windows Azure are becoming more and more popular but it seems many people are still unclear as to what exactly the buzzword “Cloud computing” actually means. In its simplest form, the principle of
Cloud computing is the provision of computing resources via a network.
Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because of the opportunities it is offering. The market research and analysis firm IDC suggests that the market for Cloud Computing services was ` 68000 crore in 2008 and will rise to `178500 crore/year by 2012 [1]. It has been estimated that the cost advantages of Cloud Computing to be three to five times for business applications and more than five times for
References: Gleeson, E. (2009). Computing industry set for a shocking change. Retrieved May 10, 2010 from http://www.moneyweek.com/investmentadvice/computing-industry-set-for-ashocking-change-43226.aspx [2]. Gartner (2008). Gartner Says Cloud Computing Will Be As Influential As E-business. Gartner press release, 26 June 2008. Boss, G., Malladi, P., Quan, D., Legregni, L., Hall, H. (2007), Cloud Computing.www.ibm.com/developerworks/websphere/zones/hipods/. Retrieved on 20th May, 2010. Foster I, Kesselman C (1998) Computational Grids. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.4939 [5]. Foster I, Kesselman, C, Tuecke S (2001) The Anatomy of the Grid: Enabling Scalable Virtual Organization. International Journal of High Performance Computing Applications 15(3):200-222 Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop (GCE’08) Fellowes, W. (2008). Partly Cloudy, Blue-Sky Thinking About Cloud Computing. Whitepaper. 451 Group. Khajeh-Hosseini, A., Greenwood, D., Sommerville, I., (2010). Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. 21, 2010, Santos N, Gummadi K, Rodrigues R (2009) Towards trusted cloud computing. In: Proc of HotCloud [16]. April Krautheim FJ (2009) Private virtual infrastructure for cloud computing CIO, Armbrust M et al (2009) Above the clouds: a Berkeley view of cloud computing Ghemawat S, Gobioff H, Leung S-T (2003) The Google file system. In: Proc of SOSP, October 2003 Hadoop Distributed File System, hadoop.apache.org/hdfs