scholarly journals Opportunities and Challenges of Data Migration in Cloud

2021 ◽  
Vol 9 (1) ◽  
pp. 41-50
Author(s):  
Ruhul Amin ◽  
Siddhartha Vadlamudi

Cloud data migration is the process of moving data, localhost applications, services, and data to the distributed cloud processing framework. The success of this data migration measure is relying upon a few viewpoints like planning and impact analysis of existing enterprise systems. Quite possibly the most widely recognized process is moving locally stored data in a public cloud computing environment. Cloud migration comes along with both challenges and advantages, so there are different academic research and technical applications on data migration to the cloud that will be discussed throughout this paper. By breaking down the research achievement and application status, we divide the existing migration techniques into three strategies as indicated by the cloud service models essentially. Various processes should be considered for different migration techniques, and various tasks will be included accordingly. The similarities and differences between the migration strategies are examined, and the challenges and future work about data migration to the cloud are proposed. This paper, through a research survey, recognizes the key benefits and challenges of migrating data into the cloud. There are different cloud migration procedures and models recommended to assess the presentation, identifying security requirements, choosing a cloud provider, calculating the expense, and making any essential organizational changes. The results of this research paper can give a roadmap for data migration and can help decision-makers towards a secure and productive migration to a cloud computing environment.

2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


2018 ◽  
pp. 27-53
Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2019 ◽  
Author(s):  
Lin Shi ◽  
Zilong Wang ◽  
Ning Chen ◽  
Jie Chen

Abstract Highly trusted issues will be one of the main obstacles to a new era of highly trusted cloud computing. In the cloud computing environment, because sensitive applications and user data are put into the cloud, they run in virtual machines in the data center. Among them, due to the existence of access vulnerability, virtualization vulnerability, web application vulnerability, etc., high trust issues arise from data control, identity authentication, lack of information and other related issues. The introduction of trust mechanisms can be very facilitate the solution of related issues, achieve highly trusted quantification, analysis, and modeling of cloud data centers, meet high trust requirements, and provide users with a highly trusted cloud computing environment. This article mainly studies the trust measure of data services in cloud environment. In this paper, the optimization scheme is verified through experiments, and the traditional big data processing scheme, the original Sahara and the optimization scheme are compared in six cases. Overall, the optimization scheme has a significant performance improvement. Compared with the default configuration of Sahara, the configuration of the new interface has increased the throughput in DFSIO by 120%. Using the design of the unified cache management service, Tachyon can reach 13 in specific situations. In the execution time of Sort workloads, the optimization scheme generally decreased by about 50% compared to the original Sahara, and the memory utilization increased from 80% to 96% in our experiments, but in the cache isolation and other areas need to be improved. The results are basically in line with expectations, which also confirms the rational thinking and value of this article on BDAaS performance research.


Author(s):  
Kumaraswamy S ◽  
Mydhili K Nair

<p>Cloud computing has become more commercial and familiar. The Cloud data centers havhuge challenges to maintain QoS and keep the Cloud performance high. The placing of virtual machines among physical machines in Cloud is significant in optimizing Cloud performance. Bin packing based algorithms are most used concept to achieve virtual machine placement(VMP). This paper presents a rigorous survey and comparisons of the bin packing based VMP methods for the Cloud computing environment. Various methods are discussed and the VM placement factors in each methods are analyzed to understand the advantages and drawbacks of each method. The scope of future research and studies are also highlighted.</p>


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Chenyu Wang ◽  
Ke Ding ◽  
Bin Li ◽  
Yiming Zhao ◽  
Guoai Xu ◽  
...  

With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent. As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention. Though considerable efforts have been paid for a secure and practical authentication scheme in cloud computing environment, most attempts ended in failure. The design of a secure and efficient user authentication scheme for cloud computing remains a challenge on the one hand and user’s smart card or mobile devices are of limited resource; on the other hand, with the combination of cloud computing and the Internet of Things, applications in cloud environments often need to meet various security requirements and are vulnerable to more attacks. In 2018, Amin et al. proposed an enhanced user authentication scheme in cloud computing, hoping to overcome the identified security flaws of two previous schemes. However, after a scrutinization of their scheme, we revealed that it still suffers from the same attacks (such as no user anonymity, no forward secrecy, and being vulnerable to offline dictionary attack) as the two schemes they compromised. Consequently, we take the scheme of Amin et al. (2018) as a study case, we discussed the inherent reason and the corresponding solutions to authentication schemes for cloud computing environment in detail. Next, we not only proposed an enhanced secure and efficient scheme, but also explained the design rationales for a secure cloud environment protocol. Finally, we applied BAN logic and heuristic analysis to show the security of the protocol and compared our scheme with related schemes. The results manifest the superiority of our scheme.


Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5604
Author(s):  
Hsiao-Ling Wu ◽  
Chin-Chen Chang ◽  
Yao-Zhu Zheng ◽  
Long-Sheng Chen ◽  
Chih-Cheng Chen

The Internet of Things (IoT) is currently the most popular field in communication and information techniques. However, designing a secure and reliable authentication scheme for IoT-based architectures is still a challenge. In 2019, Zhou et al. showed that schemes pro-posed by Amin et al. and Maitra et al. are vulnerable to off-line guessing attacks, user tracking attacks, etc. On this basis, a lightweight authentication scheme based on IoT is proposed, and an authentication scheme based on IoT is proposed, which can resist various types of attacks and realize key security features such as user audit, mutual authentication, and session security. However, we found weaknesses in the scheme upon evaluation. Hence, we proposed an enhanced scheme based on their mechanism, thus achieving the security requirements and resisting well-known attacks.


Author(s):  
Sudhansu Shekhar Patra

Energy saving in a Cloud Computing environment is a multidimensional challenge, which can directly decrease the in-use costs and carbon dioxide emission, while raising the system consistency. The process of maximizing the cloud computing resource utilization which brings many benefits such as better use of resources, rationalization of maintenance, IT service customization, QoS and reliable services, etc., is known as task consolidation. This article suggests the energy saving with task consolidation, by minimizing the number of unused resources in a cloud computing environment. In this article, various task consolidation algorithms such as MinIncreaseinEnergy, MaxUtilECTC, NoIdleMachineECTC, and NoIdleMachineMaxUtil are presented aims to optimize energy consumption of cloud data center. The outcomes have shown that the suggested algorithms surpass the existing ECTC and FCFSMaxUtil, MaxMaxUtil algorithms in terms of the CPU utilization and energy consumption.


Sign in / Sign up

Export Citation Format

Share Document