scholarly journals Cloud Computing Architecture

Author(s):  
Pardeep Mehta ◽  

Cloud computing—delivering infrastructure, services, and software on demand via the network—offers attractive advantages to the public sector. It has the potential to reduce information and communications technology (ICT) costs by virtualizing capital assets like disk storage and processing cycles into a readily available, affordable operating expense. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance problem and security issues. Cloud is a platform shuffle that enables a fierce and contentious debate on the issues of security and performance surrounding how to secure information and instantiate trust in an increasingly open and assumed-hostile web operating environment. When you start adding new hardware/update existing hardware in a web cloud, the complexity starts increasing which affects performance and hence security. Here we will define the algorithms to keep both performance and data secure but flexible enough to allow for expandability. In this paper, we have highlighted the following critical issues for the leading Cloud Computing such as Characteristics of cloud computing, threats and performance analysis. This paper specifically discuss about the below-mentioned in detail.

2018 ◽  
Vol 189 ◽  
pp. 10015 ◽  
Author(s):  
Karim Zkik ◽  
Said EL Hajji ◽  
Ghizlane Orhanou

The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.


2013 ◽  
Vol 9 (1) ◽  
pp. 13
Author(s):  
H.S. Lim ◽  
Wahidah Husain

Cloud computing is an undeniable shift paradigm due to the rapid advancement in processors, distributed grid computing, disk storage and performance, Internet networking and virtualization techniques. Adoption of cloud computing in business creates some considerable business values. So basically this paper will concentrate on the study of the cloud adoption in business. Besides, this paper also aims to investigate the business benefit gained by adopting cloud computing in the business as well as the key challenges of cloud adoption in business.


2015 ◽  
pp. 1548-1560
Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


2012 ◽  
Vol 198-199 ◽  
pp. 435-438
Author(s):  
You Chan Zhu ◽  
Peng Liu ◽  
Jun Ting Wang

This paper first analyzes the security issues that are hidden in the public Cloud Computing environments, then puts forward to the corresponding solutions of various security issues, and lastly summarizes the importance of choosing suitable cloud service for enterprises.


Author(s):  
Hero Modares ◽  
Jaime Lloret ◽  
Amirhossein Moravejosharieh ◽  
Rosli Salleh

Cloud computing is a new and promising technology that is transforming the paradigm of traditional Internet computing and probably the whole IT industry. Cloud computing is predicted to expand in the mobile environment leveraging on the rapid advances in wireless access technologies. These mobile applications are built around mobile cloud computing techniques and models. In the Mobile Cloud environment, users can remotely store their data as well as enjoy high quality on-demand cloud applications without the limitations of having to purchase and maintain their own local hardware and software. However, data security is still a major concern and is the main obstacle preventing cloud computing from being more widely adopted. This concern originates from the fact that sensitive data stored in the public clouds is managed by commercial service providers who might not be totally trustworthy. As such, there are several security and privacy issues that need to be addressed. This chapter gives an overview on the cloud computing concept followed by a description on mobile cloud computing and the different security issues pertinent to the mobile cloud computing environment.


Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based services to its customers. It provides a set of shared computing resources such as networking, servers, storage, and applications in the form of services to an organization or an individual. The major benefits of cloud computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for setting up and running the applications on the cloud. Despite the benefits provided by various cloud services, the outsourcing of data storage and computation raise many new security issues. One of such security issues that have to be addressed before uploading our sensitive data to the cloud is data privacy. With the cloud model, end-users lose control over the physical location of data, because data will be stored and processed elsewhere on the globe and not in the local computer. Hence, we need an algorithm for encrypting the data that can be stored and retrieved from a database managed by the public cloud.


2019 ◽  
Vol 16 (10) ◽  
pp. 4389-4393 ◽  
Author(s):  
Mani Goyal ◽  
Avinash Sharma

Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implement a novel architecture, the first of its kind, providing an enhanced level of security for outsourcing data in a cloud computing environment consisting of multiple independent cloud providers. The framework consists of dual encryption combining Homomorphic encryption at the client end and Blowfish cryptographic technique at the server side for authorization. The diverse security issues associated with information integrity, security, confidentiality, and authenticationmust be addressed. Simulations and analysis were performed on an Oracle virtual machine Virtual-Box and a Fog environment on Ubuntu 12.04 platform. Extensive safety measures and performance analysis considering the Encrypted file size and Encryption time demonstrate that our projected proposal is vastly proficient and satisfies the requirements for secure data sharing.


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


Sign in / Sign up

Export Citation Format

Share Document