Cloud Computing Characteristics, Issues and Limitations

Authors

  • Yashraj Dalvi  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Balaji Chaugule  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Dipali Pawar  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India

Keywords:

Cloud computing; Cloud security; Virtualization; Data integrity, Public auditing.

Abstract

Since the phenomenon of cloud computing was proposed, there is an unceasing interest for research across the world. Cloud computing has been seen as sole of the technology that poses the next-generation computing revolution and rapidly becomes the hottest topic in the field of IT. This is fast move towards Cloud computing has fuelled concerns on a fundamental point for the success of information systems, communication, virtualization, data availability and integrity, public auditing, scientific application, and information security. Hence, cloud computing research has attracted huge interest in recent years. In this paper, we aim to precise a current open challenges and issues of Cloud computing. We have discussed the paper in three-fold: first we discuss the cloud computing architecture and the frequently services it offered. Secondly we highlight several security issues in cloud computing based on its service layer. Then we identify many open challenges from the Cloud computing adoption perspective and its future implications. Finally, we highlight the available platforms in the current era for cloud research and development.

References

  1. Armbrust, Michael, et al. ”A view of cloud computing.” Communications of the ACM, 53(4), pp. 50-58, 2010.
  2. Sasikala, P. ”Research challenges and potential green technological appli- cations in cloud computing.” International Journal of Cloud Computing, 2(1), pp. 1-19, 2013.
  3. Zissis, Dimitrios, Dimitrios Lekkas. ”Addressing cloud computing secu- rity issues.” Future Generation Computer Systems, 28(3), pp. 583-592, 2012.
  4. R. Sherman, Distributed systems security, Computers & Security 11 (1), 1992.
  5. Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. ”Mobile cloud computing: A survey.” Future Generation Computer Systems, 29(1), pp. 84-106, 2013.
  6. Plummer, D.C., Bittman, T.J., Austin, T., Cearley, D.W. and Smith, D.M. ”Cloud Computing: Defining and Describing an Emerging Phenomenon.” Gartner, 2008.
  7. Staten, J. ”Is Cloud Computing Ready for the Enterprise”, 2008.
  8. Mell, P. and Grance, T. ”The NIST Definition of Cloud Computing.” 2009.
  9. Buyya, R., Yeo, C. and Venugopal, S. ”Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities, HPCC, 10th Proceedings IEEE, pp. 5-13, 2008.
  10. Schad, Jrg, Jens Dittrich, and Jorge-Arnulfo Quian-Ruiz. ”Runtime measurements in the cloud: observing, analyzing, and reducing variance.” Proceedings of the VLDB Endowment, pp. 460-471, 2010.
  11. Iosup, Alexandru, Nezih Yigitbasi, and Dick Epema. ”On the per- formance variability of production cloud services.” CCGrid, 2011 11th IEEE/ACM International Symposium on, pp. 104-113. IEEE, 2011.
  12. Di Niu; Zimu Liu; Baochun Li; Shuqiao Zhao; , ”Demand forecast and performance prediction in peer-assisted on-demand streaming systems,” INFOCOM, Proceedings IEEE , pp. 421-425, 2011.
  13. Al-Tamimi, A.-K.; Jain, R.; So-In, C.;, ”Dynamic resource allocation based on online traffic prediction for video streams,” Internet Multimedia Services Architecture and Application(IMSAA), 2010 IEEE 4th Interna- tional Conference on, pp. 1-6, 2010.
  14. Caron, E.; Desprez, F.; Muresan, A.; , ”Forecasting for Grid and Cloud Computing On-Demand Resources Based on Pattern Matching,” Cloud Computing Technology and Science (CloudCom), IEEE 2nd International Conference on , pp. 456-463, 2010.
  15. Kalyvianaki, Evangelia, Themistoklis Charalambous, and Steven Hand. ”Self-adaptive and self-configured CPU resource provisioning for virtual- ized servers using Kalman filters.” In Proceedings of the 6th international conference on Autonomic computing, ACM, pp. 117-126. 2009.
  16. Poola, Deepak, Saurabh Kumar Garg, Rajkumar Buyya, Yun Yang, Kotagiri Ramamohanarao. ”Robust scheduling of scientific workflows with deadline and budget constraints in clouds.” 28th IEEE Int. Conf. on Advanced Information Networking and Applications, pp. 1-8. 2014.
  17. T. Sousa, A. Silva, and A. Neves, Particle swarm based data mining algorithms for classification tasks, Parallel Comput., 30(5), pp. 767783, 2004.
  18. S. Abrishami, M. Naghibzadeh, and D.H.J. Epema. ”Deadline- constrained workflow scheduling algorithms for infrastructure as a service clouds.” Future Generation Computer Systems, 29(1), pp. 158-169, 2013.
  19. Rodriguez, M.A; Buyya, R., ”Deadline Based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds,” Cloud Computing, IEEE T. on, 2(2), pp.222-235, 2014.
  20. K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, 16(1), pp. 69-73, 2012.
  21. Boyang Wang; Baochun Li; Hui Li, ”Oruta: privacy-preserving public auditing for shared data in the cloud,” Cloud Computing, IEEE Transac- tions on , 2(1), pp.43-56, 2014.
  22. C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, Proc. IEEE INFOCOM, pp. 525-533, 2010.
  23. Zissis, Dimitrios, and Dimitrios Lekkas. ”Addressing cloud computing security issues.” Future Generation Computer Systems, 28(3), pp. 583- 592, 2012.
  24. Choudhary, V. Software as a service: Implications for investment in software development. 40th Annual Hawaii International Conference on System Sciences, IEEE, 209a-209a, 2007.
  25. Subashini, S. and V. Kavitha (2011). ”A survey on security issues in service delivery models of cloud computing.” Journal of Network and Computer Applications, 34(1), pp.1-11, 2011.
  26. Gajek, S., et al. Breaking and fixing the inline approach. ACM workshop on Secure web services, ACM, 2007.
  27. Descher, M., et al. Retaining data control to the users in infrastructure clouds. International Conference on Availability, Reliability and Security, IEEE, pp. 9-16, 2009.
  28. Staten, James, et al. ”Is cloud computing ready for the enterprise.” Forrester Research, 2008.
  29. Seccombe A, et al. Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance, 2(1), 2009.
  30. Calheiros, Rodrigo N., Rajiv Ranjan, Anton Beloglazov, Csar AF De Rose, and Rajkumar Buyya. ”CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms.” Software: Practice and Experience, 41(1), pp. 23-50, 2011.
  31. B. Wickremasinghe, R. N. Calheiros, R. Buyya, CloudAnalyst: A CloudSim-based Visual Modeller for analysing Cloud Computing En- vironments and Applications, 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.
  32. Garg, S. K., & Buyya, R. NetworkCloudSim: modelling parallel appli- cations in cloud simulations. In Utility and Cloud Computing (UCC), 4th IEEE International Conference on, pp. 105-113, 2011.
  33. A. Nunez, et al. iCanCloud: A Flexible and Scalable Cloud Infrastructure Simulator, Jr. of Grid Computing, 10(1), pp 185-209, 2012.
  34. R. N. Calheiros, M .A. S. Netto, C. A. F. De Rose, and R. Buyya, EMUSIM: an integrated emulation and simulation environment for mod- eling, evaluation, and validation of performance of cloud computing applications, Software-Practice and Experience, 43(5), pp. 595-612, 2012.
  35. S. Ostermann, K. Plankensteiner, R. Prodan, Th. Fahringer, GroudSim: An Event-Based Simulation Framework for Computational Grids and Clouds, Euro-Par 2010 Parallel Processing Workshops Lecture Notes in Computer Science, pp. 305-313, 2011.
  36. J Jung,H Kim, ”MR-CloudSim: Designing and implementing MapRe- duce computing model on CloudSim, International Conference on ICT Convergence (ICTC), pp. 504-509, 2012.
  37. M. Tighe, G. Keller, M. Bauer, H .Lutfiyya, DCSim: A Data Centre Sim- ulation Tool for Evaluating Dynamic Virtualized Resource Management, 8th international conference and 2012 workshop on systems virtualization management (svm) Network and service management (cnsm), pp. 385- 392, 2012.

Downloads

Published

2022-03-30

Issue

Section

Research Articles

How to Cite

[1]
Yashraj Dalvi, Balaji Chaugule, Dipali Pawar, " Cloud Computing Characteristics, Issues and Limitations" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 2, pp.362-372, March-April-2022.