scholarly journals Vivid analysis of Cloud Computing along with its security issues and challenges

2021 ◽  
Vol 23 (07) ◽  
pp. 458-463
Author(s):  
Varun Ravalia ◽  
◽  
Neha Sehrawat ◽  

In the modern era, technologies are being used by everyone.” Cloud” refers to a collaborative expression for boundless advancements and progression. Cloud computing is a disruptive technology for providing on-demand access to data and applications from anywhere at any time in the world. Cloud computing incorporates various available innovations and technologies like virtualization, bandwidth networks, Web 2.0, browser interfaces, and time-sharing. Cloud computing enables us to share the resources like storage, applications, services, and networks without physically obtaining them. The data is stored in the databases on the servers and users/clients need to request access by sending the request to these servers. This paper includes the various details of cloud technology, its characteristics, its models alongside the challenges and problems faced in cloud computing. Here the focus is on the theoretical explanation of the cloud, models of the cloud, and the problems in the security and confrontation faced during the exertion of the cloud technology.

2019 ◽  
pp. 249-263 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


Author(s):  
Kevin Curran ◽  
Sean Carlin ◽  
Mervyn Adams

Cloud Computing is a distributed architecture that centralizes server resources on a scalable platform so as to provide on demand computing resources and services. Cloud computing has become a variable platform for companies to build their infrastructures upon. If companies are to consider taking advantage of cloud based systems, they will be faced with the task of seriously re-assessing their current security strategy, as well as the cloud-specific aspects that need to be assessed. The authors outline in this chapter what cloud computing is, the various cloud deployment models, and the main security risks and issues that are currently present within the cloud computing industry.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Author(s):  
Hamisu Alhaji Ali

In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy continually understand that by just outsourcing or tapping the cloud  resources, a package of virtualise, elastic, instant on-demand provision, and scalable; infrastructure, platform, and software can be access fast and easy inform of services at a negligible amount via the internet. However, as individuals and organizations embarked on the course of deploying their information and data into the cloud, anxieties are beginning to develop on whether the cloud environment is safe. This research provides an overview of the cloud deployment model, the services they offer and discusses the security issues and challenges of cloud computing in both data storage and virtual applications/servers.


2019 ◽  
pp. 1047-1064
Author(s):  
Lalit Mohan Sanagavarapu ◽  
Gangadharan G.R. ◽  
Raghu Reddy Y.

The expenses in the sustenance of IT investments has become a major ledger item in businesses to the extent that in some cases business priorities had to be changed for sustaining IT systems. Cloud computing, a disruptive technology, is changing the sustenance model with on-demand and metered service approach. However, the adoption of this technology has not been consistent across sectors due to fear on loss of control and changes required in application development and deployment. Authors propose KIET (Knowing, Initiating, Evolving and Transforming) framework based on diffusion theory for adoption of cloud computing in organizations that have strong regulatory framework. Authors implemented the proposed framework on the Indian Banking sector, with majority of the banks being in the public sector. After the implementation of the framework, 49.4% of the banks have adopted cloud computing and another 27.8% of the banks have started the initial steps for adoption.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2016 ◽  
Vol 6 (3) ◽  
pp. 32-44 ◽  
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2018 ◽  
Vol 8 (4) ◽  
pp. 72-87
Author(s):  
Lalit Mohan Sanagavarapu ◽  
Gangadharan G.R. ◽  
Raghu Reddy Y.

The expenses in the sustenance of IT investments has become a major ledger item in businesses to the extent that in some cases business priorities had to be changed for sustaining IT systems. Cloud computing, a disruptive technology, is changing the sustenance model with on-demand and metered service approach. However, the adoption of this technology has not been consistent across sectors due to fear on loss of control and changes required in application development and deployment. Authors propose KIET (Knowing, Initiating, Evolving and Transforming) framework based on diffusion theory for adoption of cloud computing in organizations that have strong regulatory framework. Authors implemented the proposed framework on the Indian Banking sector, with majority of the banks being in the public sector. After the implementation of the framework, 49.4% of the banks have adopted cloud computing and another 27.8% of the banks have started the initial steps for adoption.


2021 ◽  
Author(s):  
Hofa Abid

Many cloud-based marketing programs, ranging from CRM systems to marketing automation solutions,are already widely used. These services let marketers monitor campaigns and activities across mobile,social, and Web platforms, as well as customer interactions. As Internet usage has spread acrossdevices, there are more ways to engage potential consumers in this modern era - but it is also morechallenging to attract their attention. Customers desire stuff that is unique, organic, engaging, andpersonalized. Marketers may employ cloud technology to generate new data-driven strategies and moretailored and targeted marketing. These tools will very definitely be combined with one of the digitalmarketing components listed below.


Author(s):  
Liwen He ◽  
Feiyi Huang ◽  
Jie Zhang ◽  
Bin Liu ◽  
Chunling Chen ◽  
...  

Cloud computing brings efficiency improvement on resource utilization nd other benefits such as on-demand service provisioning, location independence and biquitous access, elastic resource pooling, pay as usage pricing mode, etc. However, t also introduces new security issues because the data management and ownership re separated, and the management is operated on a virtualized platform. In this paper,  novel dynamic secure interconnection (DSI) mechanism is proposed to isolate he cloud computing system into a couple of dynamic virtual trust zones with different ecurity policies implemented for different customers so as to enhance security. xperimental results are presented to demonstrate the feasibility and effectiveness of he DSI mechanism.


Sign in / Sign up

Export Citation Format

Share Document