Wednesday, June 1, 2016

Cloud Intellect Framework


Cloud Intellect framework comprises a number of modules-Identity Matrix (IMx) being one of them. The architecture is designed in a way that it offers processes a virtual view of a network interface to support user level access to high-speed communication devices like biometric devices to support user level identification system. As the target audience are scrutinized and their corresponding interest groups are better understood, the framework could be further refined such that it would make a systematic data warehouse depicting meaningful information for various public and private sector organizations and businesses etc. The right information would be directed towards right people at the right time; thus helping organizations to take right actions based on global network of trusted peers, as well as eliminating risks posed by identified malicious users.

Monday, May 30, 2016

Security in Cloud

A new field being introduced is Information Protection and Control (IPC), in the security market, is focusing on complying with privacy law enforcement policies and protecting sensitive data. Security companies that pioneered the concept of Data Loss Prevention (DLP) took over the IPC market in the second half of this decade. Thus, for the prevention of unauthorized delivery of sensitive corporate information, there are solutions that are being designed.

As discussed earlier Cloud computing with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. The latest research progress is in the field of cloud security (Wu et al., 2011). Finally, trusted cloud computing as another research field is pointed out and is there to integrate with cloud computing.

Trust in cloud data center is based on several core concepts: 
  • Security: Factors include; data theft, eves dropping, user authentication, and resource access control, encryption, and incident detection. 
  • Control: Control comes when enterprise knows how to directly manage, where, and by whom data and applications are deployed and used. 
  • Compliance and Service-Level Management: The concept refers to contracting and enforcement of Service-Level Agreements(SLA)between variety of parties, and conformance with regulatory, legal, and general industry standards
For business communities on web trust is the backbone. Businesses are reluctant to accept cloud computing platforms for their businesses as trust and security isn’t fully implemented yet.

Identity Matrix (IMx) solution is proposed enhancing the present Architectural Framework for Trusted Cloud Computing (AFTCC). It suggests adding a module in the present architecture of cloud computing for biometric identification at user level. Any user who is logging into cloud has to verify his identity through biometric check – thumb impression would be the best option for the time being. Then the details user enters against his impression should be verified by online Identity Card (IC) issuing authorities on international level with respect to the respective country the individual belongs. Biometric device would be built-in in any future electronic device that can be connected to internet.

Saturday, May 28, 2016

Analytics drives healthcare data storage in the cloud

For many CIOs and other IT executives at hospitals and health systems, planning a storage redesign comes with multiple angles.
For example, health IT professionals must:
  • Rationalize what data files and applications will be earmarked for storage in the cloud.
  • Determine what data will remain on-premises.
  • Figure out if any new technologies will be used to process patient information that must be stored to meet regulatory requirements.
As healthcare organizations embark on new data-driven initiatives -- such aspopulation health, precision medicine and big data analytics -- many medical facilities are focused on remodeling the way they store data and are looking at technologies, including cloud computing, to reduce costs and enhance performance.
The decisions around healthcare data storage in the cloud are also being shaped by the size of a hospital and the scope of its work. For instance, a hospital that conducts medical research may find the need to buy more storage technology or may opt to engage cloud services to store older research projects.
What is also evident is that storing data has to be done in a way that meets the needs and regulatory requirements of many stakeholders.

Wednesday, April 13, 2016

Cloud Intro

Cloud computing, envisioned as the next-generation architecture of IT Enterprise, is a new area of research that carries certain ambiguities pertaining to its potential use in the modern era where everyone is much concerned about privacy and security of digital data. Cloud computing utilizes dynamic, scalable and often visualized resources to provide computation and data management services over the Internet. The cloud users generally use HTTP as a medium to avail these services. In cloud computing, the knowledge, expertise or control over the technology infrastructure is ordinarily not needed by the user. The term “cloud computing” is used with relevance of diagrammatical representation of the cloud symbol which is often used to depict the Internet inflow charts. Thus, cloud is an abstraction symbol to represent the underlying complex infrastructure. In cloud computing, the provider builds solution (i.e., software, infrastructure or platform) over the Internet and these services are made available to the users on demand via subscription (Bhaskardeep, 2010).

Theoretically, there are three types of cloud. Private clouds are limited within an organization or a business having its own internal data-center. Therefore, private clouds are not considered a part of cloud computing. The Internet services used by the general public worldwide is known as public cloud. Hybrid cloud is a mix of public cloud environment and isolated resources on private and controlled premises. In this type of cloud, certain aspects of IT infrastructure consisting of storage and computation devices etc. usually run on public cloud, while rest of classified IT infrastructure resides on secure and private premises. A few technologists believe in promoting the transfer of gigabytes of operational data on cloud to fully exploit business intelligence, but a large number of IT professional find the hybrid approach more practicable.