Cloud computing: its characteristics, security issues and challenges

Cloud computing: its characteristics, security issues and challenges

Achla Gupta Soma Bandyopadhyay  S.S. Thakur 

Computer Science and Engineering, MCKV Institute of Engineering, Liluah, Howrah 711204, India

Corresponding Author Email: 
somabanmuk@yahoo.co.in
Page: 
76-81
|
DOI: 
10.18280/rces.040207
Received: 
| |
Accepted: 
| | Citation

OPEN ACCESS

Abstract: 

With the advent of Internet technology, cloud computing has become backbone for IT enabled serviceswith tremendous momentum. It is a growing paradigm which offers on-demand services on a pay-per-use basis. Now a days the need for online services such as storage space, software, platforms etc. is increasing rapidly. Cloud computing is a model for enabling on-demand, on-network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). Due to its virtualization technique, location independency, scalability cloud has revolutionized IT and business regime in today’s era. This paper aims to provide basic understanding of cloud, the technological innovation regarding this field, its service and architecture in a brief and lucid manner. In addition to that the advantages,  different security issues and challenges in cloud computing have been highlighted in this paper.

Keywords: 

Cloud Computing, Internet Technology, Cloud Architecture, Services, Security

1. Introduction
2. Cloud Architecture
3. Cloud Services
4. Advantages of Cloud Computing
5. Security Issues in Cloud Computing
6. Conclusions
Acknowledgement
  References

[1] Rochwerger B., Breitgan, D., Levy E., Galis A., Nagin K., Llorente I.M., Montero R., Wolfsthal Y., Elmroth E., Caceres J., Ben-Yehuda M., Emmerich W., Galan F. (2009). The reservoir model and architecture for open federated cloud computing, IBM Journal of Research and Development, Vol. 53, No. 4, pp. 535-545. DOI:10.1147/JRD.2009.5429058

[2] Kyriazis D., Menychtas A., Kousiouris G., Oberle K., Voith T., Boniface M., Oliveros E., Cucinott T., Berger S. (2010). A real-time service oriented infrastructure, International Conference on Real-Time and Embedded Systems, Singapore. DOI: 10.5176/9789810876548_R47

[3] Schurr A. (2009). Keep an eye on cloud computing, Network World, citing the Gartner report, Cloud Computing Confusion Leads to Opportunity. Retrieved 2009-09-11. 

[4] Mohammad H., Ladan T. (2012). Cloud computing uncovered: a research landscape, Elsevier Press, pp. 41-85. ISBN 0-12-396535-7. 

[5] Mell P. (2012). What’s special about cloud security? It Professional, Vol. 14, No. 4, pp. 6-8. 

[6] Bandyopadhyay S., Thakur S.S. (2016). Cloud computing: its characteristics, available models, potential challenges and future prospects, Ipasj International Journal of Information Technology (IIJIT), Vol. 4, No. 9, pp. 001-011, ISSN 2321-5976.

[7] Bandyopadhyay S., Thakur S.S. (2016). An overview of cloud computing and cloud service negotiation: some perspectives, (CCSN 2016)5th International Conference on Computing, Communication and Sensor Network, pp 106-112.

[8] Cloud Computing: Clash of the clouds, The Economist, 2009-10-15.

[9] Gruman G., Knorr E. (2008). What cloud computing really means, InfoWorld, Retrieved 2009-06-02.

[10] George R. (2009). Cloud Application Architectures, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118.

[11] Harauz J., Kaufman L.M., Potter B., Data security in the world of cloud computing, IEEE Journal on Cloud Computing Security, Vol. 7, No. 4, pp. 61-64. 

[12] Rittinghouse J.W., Ransome J.F. (2009). Cloud computing implementation, management, and security, CRC Press, ISBN 9781439806807, pp. 147-158, 183-212. 

[13] Brodkin J. (2008). Gartner: seven cloud-computing security risks, Available: http://www.infoworld.com, pp. 1-3.

[14] Amazon White Paper, http://aws.amazon.com/about-aws/whatsnew/2009/06/08/new-aws-security-center-and-securitywhitepaper/, published June 2009.

[15] Modi C., Patel D., Borisaniya B., Patel A., Rajarajan M. (2013). A survey on security issues and solutions at different layers of cloud computing, The Journal of Supercomputing, Vol. 63, No. 2, pp. 561-592. DOI: 10.1007/s11227-012-0831-5

[16] Top 7 threats to cloud computing, HELP NET SECURITY, http://www.net-security.org/secworld.php?id=8943 (2010).

[17] Hypervisor, http://en.wikipedia.org/wiki/Hypervisor

[18] Jensen M., Schwenk J., Gruschka N., Iacono L.L. (2009). On technical security issues in cloud computing, Proceedings of the 2009 IEEE International Conference on Cloud Computing, pp. 109-116. DOI: 10.1109/CLOUD.2009.60

[19] Catteddu D. (2010). Cloud computing: benefits, risks and recommendations for information security, Communications in Computer and Information Science, Vol. 72. DOI: 10.1007/978-3-642-16120-9_9