Cloud Computing: Study of Security Problems and Analysis Challenges
Keywords:
Cloud computing, Multitenancy, Data, managementAbstract
Cloud computing is that the apply of employing a network of remote servers hosted on web to store, manage and method information on demand and pay as per use. It provides access to a pool of shared resources rather than native servers or personal computers. As it doesn’t acquire the items physically, it saves managing value and time for organizations. Cloud computing could be a utterly web dependent technology wherever consumer knowledge is hold on and maintain within the knowledge center of a cloud supplier like Google, Amazon, Microsoft etc .Cloud computing is an rising domain and is acclaimed throughout the globe. There are some security problems locomotion in whereas mistreatment services over the cloud. This analysis paper presents a review on the cloud computing ideas moreover as security problems inherent inside the context of cloud computing and cloud infrastructure. This paper additionally analyzes the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers moreover as enterprises hoping to leverage cloud service to enhance their bottom line during this severe economic climate and intensify its usage. The main stress of our study supported existing literature and to know the idea of multi-tenancy security issue,
References
[1] Abbadi, I.M. and Martin, A. (2011). “Trust in the Cloud”. Information Security Technical Report, 16, 108-114. doi:10.1016/j.istr.2011.08.006
[2] Agarwal, A. and Agarwal, A. (2011). “The Security Risks Associated with Cloud Computing”. International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS), 257-259.
[3] Arshad, J, Townsend, P. and Xu, J. (2013).”A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems”, 29, 416–428. doi:10.1016/j.future.2011.08.009.
[4] Atayero, A.A. and Feyisetan, O. (2011). “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”. Journal of Emerging Trends in Computing and Information Sciences, 2(10), 546-552.
[5] Bisong, A. and Rahman, S.S.M. (2011). “An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications”, 3(1), 30-45. doi:10.5121/ijnsa.2011.3103
[6] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I. (2009). “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems”, 25, 599–616.
[7] Casola, V., Cuomo, A., Rak, M. and Villano, U. (2013). “The CloudGrid approach: Security analysis and performance evaluation. Future Generation Computer Systems”, 29, 387–401. doi:10.1016/j.future.2011.08.008
[8] Celesti, A., Fazio, M., Villari, M. and Puliafito, A. (2012). “Virtual machine provisioning through satellite communications in federated Cloud environments. Future Generation Computer Systems”, 28, 85–93. doi:10.1016/j.future.2011.05.021
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
