A Comprehensive Review on Cloud Computing and Cloud Security Issues
DOI:
https://doi.org/10.32628/CSEIT206489Keywords:
IaaS, Cloud service provider, PaaS, SaaS, DoS.Abstract
Cloud computing is a type of computing where computing services such as applications, storage, infrastructure, processing power are hosted by some vendors (cloud vendors) over the Internet and delivered to users on on-demand basis. A company can benefit from cloud computing in the sense that they can rent access to anything from applications to storage to processing power rather than owning their own IT infrastructure. By using cloud-computing services, companies can avoid the various costs and complexities associated with owning and maintaining their own IT infrastructure as everything is taken care of by the service providers. Cloud computing is a paradigm in which both the users and the service providers are benefited. Service providers are greatly benefited from cloud computing by providing cloud services to a wide range of customers. The primary objective of this paper is to give an overview on cloud computing encompassing its features, the pros and cons of cloud computing and the challenges that comes with it. Furthermore, this paper also presents a list of security concerns in cloud computing which stands in the way of wide spread adoption of cloud computing thereby motivating researchers to devise competent solutions to tackle these ongoing security issues.
References
- Divya Kapil, Parshant Tyagi, Sonu Kumar, Vinay Prasad Tamta, “Cloud computing: overview and research issues”, In the proceedings of 2017 International Conference on Green Informatics (ICGI 2017), China, Vol. 1, pp 71-76, 2017.
- Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the art and research challenges”, Journal of Internet Services and Applications, Vol. 1, pp. 7-18, 2010.
- Suyel Namasudra., Pinki Roy., Balamurugan Balusamy, “Cloud Computing: Fundamentals and Research Issues”, In the Proceedings of 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM 2017), India, Vol.1, pp 7-12, 2017.
- 4 Best Cloud Deployment Models You Need to Know.
- https://www.sam-solutions.com/blog/four-best-cloud-deployment-models-you-need-to-know/.
- Michael H. Hugos, Derek Hulitzky, “Business in the cloud: what every business needs to know about cloud computing”, Wiley, 2010.
- Peter Mell, Tim Grance, “NIST definition of cloud computing, National Institute of Standards and Technology”, 2011.
- Shyam Patidar, Dheeraj Rane, Pritesh Jain, “A Survey Paper on Cloud Computing”. In the Proceedings of 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT 2012), USA, pp 394-398, 2012.
- Subashini S, Kavitha V, “ A survey on security issues in service delivery models”. Journal of Network and Computer Applications Vol. 34, Issue 1, pp 1-11, 2011.
- Pearson S. “Taking account of privacy when designing cloud computing services”, In the Proceedings 2009 of ICSE Workshop on Software Engineering Challenges of Cloud computing, Vancouver, pp 44-52, 2009.
- S. Chaves, C. Westphall, C. Westphall, and G. Geronimo. “Customer Security Concerns in Cloud Computing”. In the Proceedings of 2011 10th International Conference on Networks (ICN 2011), The Netherlands, pp 7-11, 2011.
- Mohsin Nazir, “Cloud computing: overview and current research challenges”. IOSR Journal of Computer Engineering (IOSR-JCE) Vol. 8, Issue 1, pp 14-22, 2012.
- Gurmeet Singh, Vineet Kumar Sachdeva, “Impact and challenges of cloud computing in current scenario”. International Journal of Social Science & Interdisciplinary Research, Vol.1, Issue 10, 2012.
- Cloud Computing Risks and Challenges.
- https://www.datapine.com/blog/cloud-computing-risks-and-challenges/.
- Adrian Duncan, Sadie Creese, Michael Goldsmith, “Insider Attacks in Cloud Computing”, In the Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, England, 2012.
- Mohammad Masdari, Marzie Jalali, “A Survey on taxonomy of DoS attacks in cloud computing”, Security and Communication Networks, Wiley Online Library, Vol 9, pp 3724-3751, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.