AN ANALYTICAL STUDY ON CLOUD COMPUTING

2021 ◽  
Vol 12 (1) ◽  
pp. 30-35
Author(s):  
Dr. Anamika Ahirwar ◽  
◽  
Nikita Prajapat ◽  
Simran Raj

This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users with the ability of information technology as a service and allows them to have access to these services on the Internet without having limited information. Cloud computing can help businesses transform their closing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their demand. Cloud is a image to describe web as a space where computing has been pre-installed and close as a service; data, operating systems, applications, storage and processing power close on the web ready to be shared. In cloud computing data owners expand their complex data management systems from community sites to the public cloud for great pliability and cost-effective. The searching of this study that highlight there are five main issues related with cloud computing execution which are Mobility and Cloud Government Application security issues, Cloud Security data, cloud security platform, Cloud Security Services and Application, cloud network security issues and infrastructure issues.

Author(s):  
Wajid Hassan ◽  
Te-Shun Chou ◽  
Xiaoming Li ◽  
Patrick Appiah-Kubi ◽  
Omar Tamer

The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented.  This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2021 ◽  
Vol 12 (1) ◽  
pp. 74-83
Author(s):  
Manjunatha S. ◽  
Suresh L.

Data center is a cost-effective infrastructure for storing large volumes of data and hosting large-scale service applications. Cloud computing service providers are rapidly deploying data centers across the world with a huge number of servers and switches. These data centers consume significant amounts of energy, contributing to high operational costs. Thus, optimizing the energy consumption of servers and networks in data centers can reduce operational costs. In a data center, power consumption is mainly due to servers, networking devices, and cooling systems, and an effective energy-saving strategy is to consolidate the computation and communication into a smaller number of servers and network devices and then power off as many unneeded servers and network devices as possible.


2019 ◽  
pp. 1777-1799
Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


Author(s):  
Dhanashri M. Kale ◽  
Dr. Vilas M. Thakare

With the increased use of technology , the fog computing network is being used on a large scale The integration of fog computing into cloud computing network is full of advantages and increases features. The network currently is secured but also subjected to various challenges. In this paper, we have reviewed five different schemes which are : Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks, Fog Computing Architecture, Evaluation, and Future Research Directions, Indie Fog: An Efficient Fog-Computing Infrastructure for the Internet of Things, A Framework of Fog Computing: Architecture, Challenges, and Optimization, A Critical Analysis on Integration of Fog Computing and Cloud Computing. These schemes discussed here provide certain features but there are some limitations in it. So we propose a new scheme that helps to overcome the challenges of these previous schemes.


Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


Cloud computing is an internet-based service of delivering technology to users and an important technological facility where mutual resources are delivered on demand. Usage of cloud computing in educational Institutions provides students as well as administrative staff an opportunity to access various applications and knowledge swiftly. Its simplicity, upfront-cost, reduced downtime and less management effort make this service acceptable for all fragments of society particularly students and teachers. Despite the fact that the cloud computing technology is very useful, such as ease of access, cost effective. It has various issues like security violations, data confidentiality, data integrity, regional and geographical restrictions over the data. Safe cloud services are required to protect its users from different external threats such as disclosure or loss of data and compromising of users’ accounts. Users’ understanding about the cloud computing’s advantages, disadvantages and security issues can protect them from potential threats while ensuring its optimal usage in education. In this paper, a survey has been conducted to identify students understanding about the advantages, disadvantages and security issues regarding cloud computing in the educational sector. A sample of 212 respondents from graduate and undergraduate programs was taken to obtain required information. The findings reveal a lack of awareness about the use of cloud computing, its benefits, and security concerns and the implications of this deficiency are critical as multiple issues like outflow of personal data and its loss is faced by its users which may have adverse social, emotional and professional effects on student’s life. Considering the usefulness as well as the sensitivity of cloud computing in educational institutions, Authors propose maximum utilization of cloud computing in educational sector while ensuring the security of its users.


Author(s):  
Dr. Manish Jivtode

Cloud computing is viewed as one of the most promising technologies in computing today. This is a new concept of large scale distributed computing. It provides an open platform for every user on the pay-per-use basis. Cloud computing provides number of interfaces and APIs to interact with the services provided to the users. With the development of web services distributed application, Security of data is another important subject in various layers of distributed computing. In this study, security of data that can be used during the access of distributed environment over various layers will be described.


2018 ◽  
pp. 1624-1656
Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


Sign in / Sign up

Export Citation Format

Share Document