Cloud computing

Facebook Twitter

Understanding Cloud Computing Vulnerabilities. This article first appeared in Security & Privacy IEEE magazine and is brought to you by InfoQ & IEEE Computer Society.

Understanding Cloud Computing Vulnerabilities

Discussions about cloud computing security often fail to distinguish general issues from cloud-specific issues. To clarify the discussions regarding vulnerabilities, the authors define indicators based on sound definitions of risk factors and cloud computing. Each day, a fresh news item, blog entry, or other publication warns us about cloud computing’s security risks and threats; in most cases, secu­rity is cited as the most substantial roadblock for cloud computing uptake. But this discourse about cloud computing security issues makes it difficult to formulate a well-founded assessment of the actual se­curity impact for two key reasons. First, in many of these discussions about risk, basic vocabulary terms - including risk, threat, and vulnerability - are often used interchangeably, without regard to their respective definitions.

Vulnerability: An Overview Figure 1. Dellcloudedge's Profile - GitHub.

Providers

Benchmarking Cassandra Scalability on AWS - Over a million writes per second. By Adrian Cockcroft and Denis Sheahan Netflix has been rolling out the Apache Cassandra NoSQL data store for production use over the last six months.

Benchmarking Cassandra Scalability on AWS - Over a million writes per second

As part of our benchmarking we recently decided to run a test designed to validate our tooling and automation scalability as well as the performance characteristics of Cassandra. Adrian presented these results at the High Performance Transaction Systems workshop last week. We picked a write oriented benchmark using the standard Cassandra "stress" tool that is part of the product, and Denis ran and analyzed the tests on Amazon EC2 instances.

Writes stress a data store all the way to the disks, while read benchmarks may only exercise the in-memory cache. To measure scalability, the same test was run with 48, 96, 144 and 288 instances, with 10, 20, 30 and 60 clients respectively. EC2 Configuration All instances are created using the EC2 auto-scaler feature. Untitled. A non-profit advocate of open cloud computing. Overview of Cloudonomics « Cloudonomics.com. This is my first Cloudonomics.com post in a while, as I’ve been engaged in developing a number of Monte Carlo simulations and detailed proofs of The 10 Laws of Cloudonomics.

Overview of Cloudonomics « Cloudonomics.com

Here’s an overview of the results, with summaries of conclusions for those that don’t want to read through over 200 pages of proofs and analyses spanning economics, behavioral economics, calculus, probability, statistics, trigonometry, system dynamics, and computational complexity theory. Links to the papers and supporting simulations at ComplexModels.com are included. Here are the 10 Laws and a few bonus insights: The First Law of Cloudonomics: “Utility services cost less even though they cost more” In other words, “More is Less.”

Blogs

Nist-cc-group. Cloud Computing Roundtable. This article first appeared in IEEE Security & Privacy magazine and is brought to you by InfoQ & IEEE Computer Society. Guest editors Iván Arce and Anup Ghosh put together a roundtable discussion so readers can hear about cloud computing security from those who are on the front lines, providing services and looking at the real-world threats and requirements from the market. Anup Ghosh: Thank you all for joining us. We’ve chosen you because your companies represent sub­stantial investments in cloud computing. To start, Eric, can you talk about the size target market and scope of Google’s cloud-computing initiatives?

Eric Grosse: That’s a good question, because scale is definitely a driving factor here. The big three challenges that I see as I’m trying to protect the average Google user are, number one, authentication. The second is malware. Finally, Web-application vulnerabilities for the cloud space. Ghosh: John, can you describe the scope of Micro­soft’s efforts in cloud computing?

Cloud standards

Global Provider View. Considering using an infrastructure as a service (IaaS) or platform as a service (PaaS) to host your web applications?

Global Provider View

Are you concerned about performance and availability? Using the Global Provider View, compare cloud performance of PaaS and IaaS providers as we continuously monitor a sample application running in each of the top cloud computing service providers from around the world. See firsthand, in real time, how well the sample application performs over time from the various Internet backbone locations you see here. Methodology Overview CloudSleuth's application called Global Provider View was initially created as an internal resource to help us understand the reliability and consistency of the most popular public Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) cloud providers. The Global Provider View uses the Gomez Performance Network (GPN) to measure the performance of an identical sample application running on several popular cloud service providers. Orchestra. CloudControl » Cloud hosting platform.

Layers

Deployment models. Data Center Map. Cloud Patterns from VMware. Over the last few months WMware's Steve Jin has published several design patterns around working with virtual machines in the cloud, especially vCloud.

Cloud Patterns from VMware

He follows a common dialogue in each published pattern which makes it easy to read and consume. Libcloud python library - a unified interface to cloud server providers. Moving your Infrastructure to the Cloud: How to Maximize Benefits and Avoid Pitfalls. Executive Summary With Cloud Computing becoming more widely utilized, it is important for organizations to understand ways to maximize benefits and minimize risks of a move to the cloud. This paper details the significant benefits that Cloud Computing brings and provides guidance to IT decision makers to help their decision making process.

This is especially important given the plethora of vendors in the marketplace today. Buyers need to appreciate that assessing individual providers is critical to the success of Cloud Computing programs. Introduction Cloud Computing is a hot topic these days, with interest shown across all levels of the organization - from the C-suite, to Corporate IT through to end users.

This interest has tended to create two distinct camps however. This paper seeks to give decision makers some guidance so that they are well informed to ensure maximum cost savings, highest performance levels and strictest security from the infrastructure they ultimately invest in. Welcome to Apache Hadoop! Dr Dobbs - Cloud Computing on Rich Data.

Cloud security