Open Access   Article Go Back

World Wide Web - Cloud Boundaries

Saroj Kumar1 , Santosh Kumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 483-490, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.483490

Online published on Jun 30, 2019

Copyright © Saroj Kumar, Santosh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Saroj Kumar, Santosh Kumar, “World Wide Web - Cloud Boundaries,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.483-490, 2019.

MLA Style Citation: Saroj Kumar, Santosh Kumar "World Wide Web - Cloud Boundaries." International Journal of Computer Sciences and Engineering 7.6 (2019): 483-490.

APA Style Citation: Saroj Kumar, Santosh Kumar, (2019). World Wide Web - Cloud Boundaries. International Journal of Computer Sciences and Engineering, 7(6), 483-490.

BibTex Style Citation:
@article{Kumar_2019,
author = {Saroj Kumar, Santosh Kumar},
title = {World Wide Web - Cloud Boundaries},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {483-490},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4577},
doi = {https://doi.org/10.26438/ijcse/v7i6.483490}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.483490}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4577
TI - World Wide Web - Cloud Boundaries
T2 - International Journal of Computer Sciences and Engineering
AU - Saroj Kumar, Santosh Kumar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 483-490
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
490 213 downloads 133 downloads
  
  
           

Abstract

In the present post-industrial information epoch where the regular changing environment is depend upon technological abbreviations. Early world was related information with only joining two computers to each other, upto this secure cloud computing policies. Present world races are in racing mode where everyone want to become a leader. Today’s world war is based on information. Information is based on privacy concern over Assess, Compliance, Storage, Monitoring and privacy breaches. Over this phenomena world decide many rules and regulations as per their feasibility to provide information over cloud that still world is in need of better policies over geographical boundaries and country based political issues. Many major rules and regulation are define in this paper to maintain worldwide cloud boundaries for use of fast safe and secure.

Key-Words / Index Term

Cloud, Rapid Adoption of cloud, Barriers to cloud, Legal and Political Issues[40]

References

[1] B Thompson, “Storm Warning for Cloud Computing” (2008)Available
athttp://news.bbc.co.uk/2/hi/technology/7421099.stm (accessed 23 Mar 2009).
[2] Gartner, Inc, “Gartner Highlights 27 Technologies in the 2008 Hype Cycle for Emerging Technologies” (2008) available at http://www.gartner.com/it/page.jsp?id=739613 (accessed 23 Mar 2009).
[3] D Gottfrid, “Self-service, Prorated Super Computing Fun!” (1 Nov 2007) available at http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (accessed 23 Mar 2009).
[4] The New York Times, “The Hound of the Baskervilles. Did it Slay Sir Charles?”(29Mar1902) available at http://query.nytimes.com/mem/archivefree/pdf?res=9502E0D9103BE733A2575AC2A9659C946397D6CF (accessed 23 Mar 2009.
[5] A Conan Doyle, The Hound of the Baskervilles (London: Penguin Books, Red Classics edition,2007), at 187.
[6] Follorou, “La complainte du Blackberry dans les ministères” (2007), Le Monde, 20 Jun 2007.
[7] D Fraser, “The Canadian Response to the USA Patriot Act” (2007) 5 IEEE Security and Privacy no.5,66-68, availableat http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04336282 (accessed 23 Mar2009).
[8] Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept andObstruct Terrorism (USA PATRIOT ACT) Act 2001, Title V, s 505.
[9] Regulation of Investigatory Powers Act 2000, Part II, s 28.
[10] J Madelin, “Transformational Change – large converged networks come to life” (2008), Adaptive and Resilient Computing workshop, London, 30 Sept 2008.
[11] A Liptak, “A Wave of the Watch List, and Speech Disappears” New York Times, 4 Mar 2008 available at http://www.nytimes.com/2008/03/04/us/04bar.html (accessed 23 Mar 2009).
[12] Barr, Cloud Computing session, BarCamp Brighton 2, Falmouth, 13-15 Mar 2008.
[13] Fail Whale Fan Club, “The Fail Whale Fan Club: celebrating Twitter and our favourite error page cetacean” (2008-2009) available at http://failwhale.com/ (accessed 23 Mar 2009).
[14] Facebook, “FailWhale” (2009) available at http://www.facebook.com/pages/FailWhale/64467830480 (accessed 23 Mar 2009).
[15] Yahoo!, “flickr: Eve Whale” (2009) available at http://www.flickr.com/photos/crispy_chips/2622841707/#comment72157606109949329 (accessed 23Mar 2009).
[16] Google, “Welcome to Google Apps: Google terms of service”(2009)available at http://www.google.com/apps/intl/en/terms/user_terms.html (accessed 23 Mar 2009).
[17] Amazon Web Services LLC, “AWS Customer Agreement” (2009) available at http://aws.amazon.com/agreement/ (accessed 23 Mar 2009).
[18] P Massey, “Privacy, Regulation, Security and Cloud Computing”, Powered By Cloud, London, 2-3Feb 2009.
[19] United Nations Convention on Contracts for the International Sale of Goods (1980), art 35
[20] Salesforce.com, “Master Subscription Agreement” (2000-2009) available at http://www.salesforce.com/company/msa.jsp (accessed 23 Mar 2009).
[21] J Jones, “Data Diligence” (2005) ComputerWorld, 14 November 2005 available at http://www.computerworld.com/managementtopics/management/story/0,10801,106127,00.html(accessed 23 Mar 2009).
[22] Amazon Web Services LLC, “Amazon S3 Service Level Agreement” (2009) available at http://aws.amazon.com/s3-sla/ (accessed 23 Mar 2009).
[23] Amazon Web Services LLC, “Amazon EC2 Service Level Agreement” (2008) available at http://aws.amazon.com/ec2-sla/ (accessed 23 Mar 2009).
[24] J Brodkin, “More outages hit Amazon’s S3 storage service” NetworkWorld, 21 Jul 2008 available at http://www.networkworld.com/news/2008/072108-amazon-outages.html (accessed 23 Mar 2009).
[25] J Salmon, “Clouded in uncertainty – the legal pitfalls of cloud computing” (2008) Computing, 24Sept 2008 available at http://www.computing.co.uk/computing/features/222601/clouded-uncertainty-4229153 (accessed 23 Mar 2009).
[26] Google, “What does a Google Apps SAS70 Type II audit mean to me?” (27 Jan 2009) available at http://www.google.com/support/a/bin/answer.py?hl=en&answer=138340 (accessed 23 Mar 2009).
[27] K Greene, “Google’s Cloud Looms Large” (2007) MIT Technology Review, 3 Dec 2007 available at http://www.technologyreview.com/business/19785/page2/ (accessed 23 Mar 2009).
[28] M Crandell, “RightScale: the cloud management platform” (2009) Powered by Cloud, London, 2-3Feb 2009.
[29] D Lupafya, panel session at Powered by Cloud, London Feb 2-3 2008.
[30] J Vincent, “Prophet: a path out of the cloud” (2008), Open Source Convention (OSCON), Portland OR, 21-25 July 2008 available at http://assets.en.oreilly.com/1/event/12/Prophet,%20your%20path%20out%20of%20the%20cloud%20Presentation.pdf (accessed 23 Mar 2009).
[31] D Raywood, “Google admits that some of its Docs have been accidentally shared” (2009) S C Magazine, 10 Mar2009availableathttp://www.scmagazineuk.com/Google-admits-that-some-of-its-Docs-have-beenaccidentally-shared/article/128491 (accessed 23 Mar 2009.
[32] A Greenberg, “Cloud Computing’s Stormy Side” (19 Feb 2008) available at http://www.forbes.com/2008/02/17/web-application-cloud-tech-intel-cx_ag_0219cloud.html (accessed 22 Mar 2009).
[33] N Dhanjani, “Amazon’s Elastic Compute Cloud [EC2]: Initial Thoughts on Security Implications”(28 April 2008) available at http://www.dhanjani.com/blog/2008/04/index.html (accessed 23 Mar2009).
[34] V Pai et al, “The Dark side of the Web: An Open Proxy’s View” (2004) 34 ACM SIGCOMM Computer Communication Review issue 1, 55-62 available at http://portal.acm.org/citation.cfm?doid=972374.972385 (accessed 23 Mar 2009).
[35] A Narayanan and V Shmatikov, “Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset)” (2008) IEEE Symposium on Security and Privacy (S&P),Oakland CA, 18-21 May 2008, available at http://arxiv.org/PS_cache/cs/pdf/0610/0610105v2.pdf(accessed 23 Mar 2009).