Студопедия  
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Text 3B. Security Issues for Cloud Computing

Читайте также:
  1. A. Privatization of warfare and security
  2. A. Recruitment and military training of Chileans by private security companies with the aim of providing security services in Iraq
  3. B. Private security in Chile
  4. C. The involvement in social conflicts of private security companies that provide protective services to forestry companies
  5. E. Transnational issues
  6. Environmental issues in Kazakhstan
  7. Nsauditor Network Security Auditor
  8. Security on the Web.
  9. Text 2D. Rootkits and Security-related Risk
  10. Text 3A. Expanded Top Ten Big Data Security and Privacy Challenges

Essential Vocabulary

adversary n – противник, злоумышленник

augment v – дополнять

assurance n – обеспечение, гарантия

commodity n – продукт массового спроса

concurrency n – многопоточность

contend v – утверждать

enhancement n – расширение технических или функциональных возможностей

fine-grained access – доступ на уровне ролевых структурных единиц

holistic adj – целостный

increment v – увеличивать

load balancing – распределение нагрузки

malware n – вредоносное ПО

mapping n –распределение; преобразование

mapreduce framework n – набор библиотек для разработки

paradigm n – пример, образец, парадигма

query v – подвергать сомнению; проверять

reposting n – хранилище

state of the art system –самая современная система

thwart v – разрушать, препятствовать

There is a critical need to securely store, manage, share and analyze massive amounts of complex data to determine patterns and trends in order to improve the quality of healthcare, better safe-guard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing, one must also utilize the resource allocation and scheduling provided by clouds. Therefore, we need to safeguard the data in the midst of untrusted processes. The emerging cloud computing model attempts to address the explosive growth of web-connected devices, and handle massive amounts of data. Google has now introduced the MapReduce framework for processing large amounts of data on commodity hardware. Apache’s Hadoop distributed file system (HDFS) is emerging as a superior software component for cloud computing combined with integrated parts such as MapReduce. The need to augment human reasoning, interpreting, and decision-making abilities has resulted in the emergence of the Semantic Web, which is an initiative that attempts to transform the web from its current, merely human-readable form, to a machine-processable form. This in turn has resulted in numerous social networking sites with massive amounts of data to be shared and managed. Therefore, we urgently need a system that can scale to handle a large number of sites and process massive amounts of data. However, state of the art systems utilizing HDFS and MapReduce are not sufficient due to the fact that they do not provide adequate security mechanisms to protect sensitive data.

We are conducting research on secure cloud computing. Due to the extensive complexity of the cloud, we contend that it will be difficult to provide a holistic solution to securing the cloud, at present. Therefore, our goal is to make increment enhancements to securing the cloud that will ultimately result in a secure cloud. In particular, we are developing a secure cloud consisting of hardware (includes 800TB of data storage on a mechanical disk drive, 2400 GB of memory and several commodity computers), software (includes Hadoop) and data (includes a semantic web data repository). Our cloud system will: (a) support efficient storage of encrypted sensitive data, (b) store, manage and query massive amounts of data, (c) support fine-grained access control and (d) support strong authentication.

There are numerous security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems, virtualization, resource scheduling, transaction management, load balancing, concurrency control and memory management. Therefore, security issues for many of these systems and technologies are applicable to cloud computing. For example, the network that interconnects the systems in a cloud has to be secure. Furthermore, virtualization paradigm in cloud computing results in several security concerns. For example, mapping the virtual machines to the physical machines has to be carried out securely. Data security involves encrypting the data as well as ensuring that appropriate policies are enforced for data sharing. In addition, resource allocation and memory management algorithms have to be secure. Finally, data mining techniques may be applicable to malware detection in clouds.

There are several other security challenges including security aspects of virtualization. We believe that due to the complexity of the cloud, it will be difficult to achieve end-to-end security. However, the challenge we have is to ensure more secure operations even if some parts of the cloud fail. For many applications, we not only need information assurance but also mission assurance. Therefore, even if an adversary has entered the system, the objective is to thwart the adversary so that the enterprise has time to carry out the mission. As such, building trust applications from untrusted components will be a major aspect with respect to cloud security.

 

Task 6. Translate the following word combinations:

Commodity hardware/software; to make increment enhancements; web data repository; to query massive amounts of data; concurrency control; virtualization paradigm; mission assurance; to thwart the adversary

Task 7. Answer the questions:

1. What’s this text about?

2. What’s the major security challenge with clouds?

3. How can you characterize the Apache’s Hadoop distributed file system?

4. What possibilities will the secure cloud computing system have?

5. Cloud computing is one of the most perspective technologies, but it has numerous security issues. What’s the reason?

 

Task 8. Render the text

Task 9. Read and translate the text using Essential Vocabulary:

 




Дата добавления: 2015-01-07; просмотров: 40 | Поможем написать вашу работу | Нарушение авторских прав




lektsii.net - Лекции.Нет - 2014-2024 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав