End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues

Author(s):  
Mariem Bouchaala ◽  
Cherif Ghazel ◽  
Leila Azouz Saidane ◽  
Farouk Kamoun
2020 ◽  
Vol 13 (3) ◽  
pp. 313-318 ◽  
Author(s):  
Dhanapal Angamuthu ◽  
Nithyanandam Pandian

<P>Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud. </P><P> Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment. </P><P> Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored. </P><P> Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.</P>


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


Author(s):  
Victor Andres Ayma Quirita ◽  
Gilson Alexandre Ostwald Pedro da Costa ◽  
Patrick Nigri Happ ◽  
Raul Queiroz Feitosa ◽  
Rodrigo da Silva Ferreira ◽  
...  

2016 ◽  
Vol 76 (16) ◽  
pp. 17319-17336
Author(s):  
Xiao-jun Chen ◽  
Jia Ke ◽  
Tian-ming Zhan ◽  
Wen-xin Wang ◽  
Yong-zhao Zhan ◽  
...  

2019 ◽  
Vol 7 (7) ◽  
pp. 398-404
Author(s):  
Yashasvi Sharma ◽  
Yashraj Sharma

This paper will explore the service models and background and also presents the existing research issues implicating in cloud computing such as security, privacy, reliability, and so on. Cloud Computing, Architecture and Characteristics of Cloud Computing and also different Services and Deployment models provided in Cloud Computing. This paper provides a better understanding of the cloud computing and identifies important research issues in this rapidly growing area of computer science.


Sign in / Sign up

Export Citation Format

Share Document