Web-services research and protocol applications have been around and in use
for quite some time now. With the potential Capex and Opex savings
enterprises can potentially realise from utilizing a cloud computing service
model, there should also be added focus on ensuring that security is properly
implemented either in authentication or authorization.
Cloud Computing, with its foundation in the world of virtualization, can take
advantage of key aspects of web service implementations and security
practice; but only to a point. Web service policies are based on a static
model that is known, defined, regulated and contained. However, with Cloud
Computing, these dynamics change. We can assert that within the cloud
environment we deal with a heterogeneous digital ecosystem that is dynamic in
This leads to a concept which has been a topic of interest for the last ... (more)
Cloud Computing offers a sense of "vastness" in terms of storage and remote
processing. According to Simpson Garfinkil, a major challenge to any digital
forensics investigator investigating data within the cloud; can be an
inability to locate or identify data or code that is lost when single data
structures are split into elements.
This in effect directly impacts forensic visibility.
Within this ecosystem a major concern can be access to and the preservation
of data within an on-going digital forensic investigation. Of consideration
as mentioned in Part 1 - is that in a live and ... (more)
Expanding on the " introduction to cloud computing" article, here are some
additional suggestions for choosing a cloud service model provider.
In a typical Cloud Computing data centre, an application set will generally
be hosted over Virtual Machines running on a large number of Physical
Total Cost of Ownership (TCO) is a definite factor when considering a move
for some enterprise services into the cloud. There are certainly arguments
both for and against the merits, especially when considering the impact of
risk on an enterprise that choses to transfer risk with the a... (more)
What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user reques... (more)
I've been asked quite a few times, "when will it be a good time to get into
cloud computing?" by potential clients. My answer is typically it depends...
I know, I know.... not much direction there, but really it all depends. Why ?
Well, some may state, "we all know of the much beaten security concerns, and
we will ensure that systems on our end are secured and synced to work in
tandem with the vendors' security."
Can one ensure some degree of monitoring by the implementation of an
Intrusion Detection System (IDS) residing within the system hosting the
gateway into the cloud?