云计算英文文献和中文翻译(4)

(b)Ability to use commodity server and storage hardware (c)Ability to drive down data center operational cots (d)In one word: economics 3 Barriers to Cloud Computing A. Customer Perspective (a)Data Se


(b) Ability to use commodity server and storage hardware

(c) Ability to drive down data center operational cots

(d) In one word: economics

3 Barriers to Cloud Computing

A. Customer Perspective

(a) Data Security

(b) Many customers don’t wish to trust their data to “the cloud”

(c) Data must be locally retained for regulatory reasons

(d) Latency

(e) The cloud can be many milliseconds away

(f) Not suitable for real-time applications

(g) Application Availability

(h) Cannot switch from existing legacy applications

(i) Equivalent cloud applications do not exist

Not all applications work on public clouds

4 Architecture of cloud computing

Cloud computing architecture and its implementation is strongly defined by the Unix P hilosophy. It’s basically a set of rules and principles that developers would have to follow to ensure that cloud computing would be easily implemented and the application would be for the advantage of the user. Although there are many definitions, rules and principles for Unix Philosophy, they all point out to one belief: build one thing and make sure it works consistently. Through the Unix Philosophy, developers who design the architecture for cloud computing have to remember that they there only to support only one application or at least an output. Cloud computing could be composed of different stages but these stages are geared towards the consistent computing of the online application.

Keeping up with the demands of the application is the data centers and server farms. It could be that too much hardware could be used to support a single process but these are implemented to ensure that the saiapplication would have as many back-up plans as it could have. Applications from cloud computing is also implemented with the thought of consistent security and performance monitoring. Through proper implementation of cloud computing architecture, the application will be accessible 24/7 with a new 100% uptime for their users.

5 Security on cloud computing

Security is one of the biggest concerns of businesses in any form. Whether a business is a small brick-and-mortar or a multi-million online ventures, security should be implemented. Exposing the company to different security flaws is always inviting to different elements with malicious intent.A single security strike could mean millions of dollars for businesses and might single handedly close the business down. Proper implementation of security measures is highly recommended for cloud computing[3]. The mere fact that the application is launched through internet makes it vulnerable to any time of attack[3]. An application available in LAN (Local Area Network) only could even be infiltrated from the outside so placing an application over the internet is always a security risk. This is the unique situation of cloud computing. Implementation of cloud computing could require millions of dollars in infrastructure and applications  development but it still places itself at risk for different types of attacks.

A. Protecting the Users

Above everything else, cloud computing or any type of online application format should consider protecting its users. Developers should make sure that data related to the user should not be mishandled and could be extracted just by one.

There are two ways to ensure cloud computing security: restrictive user access and certifications.

       (i) Restrictive access could come from simple username/password challenge to complicated CAPTCHAlog in forms. But applications in cloud computing should not only base itself on these challenges. IP specific applications and user time-outs are only some of the security measures that should be implemented.

       The challenge in restrictive user access is to limit the access privilege of the user. Each user will have to be assigned manually with security clearance to ensure limitation of access to different files.