George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management, intrusion detection, perimeter security, compliance, and the "biggest security hole in the cloud - the custom Web application."
cloud platform that provides Xen based compute units, object based storage (which we present as a file system vs. having to manage RESTful based file system services) and block IO which we provide to our compute units or expose via a OpenFiler VM.
designed to provide an inexpensive, preconfigured environment for IT professionals to prototype solutions using their existing applications and includes technical components required to create a robust application delivery center in the cloud. Initially, lab users will have access to Citrix® XenApp™ alongside key Citrix C3 technologies such as Citrix Access Gateway™ and Citrix Repeater™ in the AWS cloud environment
Imagine that a Singapore-based sales manager is accessing a CRM application which was once local, but is now based in the Hong Kong data center. But it's end of quarter and the peak load on the Hong Kong CRM application is over the specified capacity limit, so the transaction (running on a virtual machine) is transferred via VMotion to the data center in San Francisco, completed and sent back to the Singapore sales office.
aim of this paper is to:
- point out that not everything is best implemented in clouds; it may be best to operate some business functions using a traditional non-cloud approach
- explain the different cloud formations that the Jericho Forum has identified
- describe key characteristics, benefits and risks of each cloud formation
- provide a framework for exploring in more detail the nature of different cloud formations and the issues that need answering to make them safe and secure places to work in