作者: Liliana Filipa Baptista Soares
DOI:
关键词: The Internet 、 Virtualization 、 Data center 、 Cloud computing 、 Provisioning 、 Computer science 、 Software as a service 、 Server 、 Computer security 、 Virtual machine
摘要: For a handful of years, cloud computing has been hot catchphrase. The industry massively adopted it and the academia is focusing on improving technology, which evolving at quick pace. paradigm consists in adopting solutions provisioned by some providers that are hosted data centers. Customers therefore tied to those third-party entities, since they becomes involved their businesses for being responsible Information Technologies (IT) infrastructures outsourced clouds. This implies customers have totally or partially migrate on-premises off-premises clouds, including, but not limited to, email, web applications, storage databases, even complete servers become wrapped services accessed via Internet. Clouds deliver scalable elastic networking, storage, processing capabilities an on-demand self-provisioned manner pay-as-you-go business model. benefits significantly, allowing them promote without worrying about inherent IT infrastructures. supplied clouds basically encapsulated one three main service delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS). They building blocks unfolding Anything-as-a-Service (XaaS) specifically customized customer requirements. IaaS mixes novel virtualization techniques with current technologies allow run Operating Systems (OSes) build entire virtual PaaS allows develop applications consistent platforms remotely, while SaaS enables enjoying pre-built software little control over application flow. These models can public private hybrid version two. Adopting model means accessing subscribed through Internet from anywhere globe. usually management interface Virtual Machines (VMs) arrange center, VMs standard remote connection protocols. authentication is, therefore, utmost importance, mostly because exposed dangers, contrarily traditional tools deeply within trusted perimeter company conventional networks. dissertation first identifies such problems reviewing approaches pointing out advantages weaknesses. example, single compromised account constitutes inherently more dangerous threat when compared website accounts, attacker gains potentially security-related configurations as well. result money losses both providers, malicious terminate VM instances running crucial applications. problem also resides fact security static