In-depth Analysis of Cloud Computing Architectures, Deployment Models, Security Issues, Virtualization Technologies, and Cloud-Based Services
Keywords:
Cloud computing, architecture, challenges, cloud platforms, research issuesAbstract
Cloud computing is the development of parallel computing, distributed computing, grid computing and virtualization technologies which define the shape of a new era. Cloud computing is an emerging model of business computing. In this paper, we explore the concept of cloud architecture and compare cloud computing with grid computing. We also address the characteristics and applications of several popular cloud computing platforms. In this paper, we aim to pinpoint the challenges and issues of cloud computing. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems. In this paper, we investigate several cloud computing system providers about their concerns on security and privacy issues.
Downloads
References
T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010
M. Q. Zhou, R. Zhang, W. Xie, W. N. Qian, and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” 2010 Sixth InternationalConference on Semantics, Knowledge and Grids(SKG), pp.105-112, DOI= 1-3 Nov. 20 10
J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan pp. 1-3, DOI= 10-12 Dec. 2010.
S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-97. DOI=10.1109/ICFN.2010. 58.
J. J. Peng, X. J. Zhang, Z. Lei, B. F. Zhang, W. Zhang, and Q. Li, “Comparison of Several Cloud Computing Platforms,” 2009 Second International Symposium on Information Science and Engineering (ISISE '09). IEEE Computer Society, Washington, DC, USA, pp. 23-27, DOI=10.1109/ISISE.2009.94.
S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The Comparison between Cloud Computing and Grid Computing,” 2010 International Conference on Computer Application and System Modeling (ICCASM), pp. V11-72 - V11-75, DOI= 22-24 Oct. 2010.
M. M. Alabbadi, “Cloud Computing for Education and Learning: Education and Learning as a Service (ELaaS),” 2011 14th International Conference on Interactive Collaborative Learning (ICL), pp. 589 – 594, DOI=21-23 Sept. 2011.
P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.
P. Mell and T. Grance, “Draft nist working definition of cloud computing - vol. 21, Aug 2009, 2009.
“Sun Microsystems Unveils Open Cloud Platform,” [Online]. Available:
http://www.sun.com/aboutsun/pr/2009-03/sunflash.20090318.2.xml,2 009.
W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a Service Security: Challenges and Solutions,” 2010 7th International Conference on Informatics and System, pp. 1-8, March 2010.
W. Itani, A. Kayssi, and A. Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures,” 2009 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.
B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities,” 2011 IEEE Security and Privacy, pp. 50-57, DOI= March/April 2011.
W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.
Almond, Carl., "A practical guide to cloud computing security," A white paper from Accenture and Microsoft, pp. 3-9, 2009.
Basson, Benhardus., "The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment," PhD theisis., Stellenbosch:Stellenbosch University, pp. 1-67, 2014.
Srinivasamurthy, Shilpashree, D. Liu., "Survey on Cloud Computing Security," In Proc. Conf. on Cloud Computing, Cloud Com, vol. 10. Pp. 412-421, 2010.
Dillon, Tharam, C. Wu, E. Chang,” Cloud computing: issues and challenges,” In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pp. 27-33. IEEE, 2010
Singhal, Paridhi., “Data Security Models in Cloud Computing,” International Journal of Scientific & Engineering Research, Vol. 4, No. 6, pp. 789-793, Jun. 2013.
Carlin, Sean, K. Curran., "Cloud computing security,” International Journal of Ambient Computing and Intelligence (IJACI) 3, no. 1, pp. 14-19, 2011. Article (CrossRef Link)
Srivastava, Prashant, S. Singh, A. Alfred Pinto, S. Verma, Vijay K. Chaurasiya, Rahul Gupta., “An architecture based on proactive model for security in cloud computing,” In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, pp. 661-666. IEEE, 2011.
Al-Anzi, Fawaz S., Sumit Kr Yadav, J. Soni, “Cloud computing: Security model comprising governance, risk management and compliance,” In Data Mining and Intelligent Computing (ICDMIC), 2014International Conference on, pp. 1-6. IEEE, 2014
Blakstad, Kåre Marius, M. Andreassen., "Security in Cloud Computing: A Security Assessment of Cloud Computing Providers for an Online Receipt Storage,” pp. 1- 103, 2010.
Padhy, Rabi Prasad, M. R. Patra, S. Chandra Satapathy., "Cloud Computing: Security Issues and Research Challenges,” International Journal of Computer Science and Information Technology &Security (IJCSITS) 1, no. 2, pp. 136-146, 2011.
Khalil, Issa M., A. Khreishah, S. Bouktif, A. Ahmad., “Security concerns in cloud computing," In Information Technology: New Generations (ITNG), 2013 Tenth International Conference on, IEEE, pp. 411-416, 2013. Article (CrossRef Link)
Mewed, Shiva Zhang, Rui, Ling Liu., "Security models and requirements for healthcare application clouds,” In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pp. 268-275. IEEE, 2010.
U. Kumar Singh, P. Sharma., "Security Based Model for Cloud Computing,” Int. Journal of Computer Networks and Wireless Communications (IJCNWC) 1, no. 1, pp. 13-19, 2011.
Vaquero, LuisM., L. R. –M, Daniel Morán., “Locking the sky: a survey on IaaS cloud security,” Computing 91, no. 1, pp. 93-118, 2011. Article (CrossRef Link)
Aliabad, Mohsen M., “Cloud computing for education and learning: Education and learning as a service(ELaaS),” In Interactive Collaborative Learning (ICL), 2011 14th International Conference on, pp. 589-594. IEEE, 2011.
Vijay.G.R, Dr.A.Rama Mohan Reddy., "Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study," Computer Engineering and Intelligent Systems, Vol.5, No.7, pp 23-30, 2014
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of research papers submitted to Distributed Learning and Broad Applications in Scientific Research retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agree to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. Scientific Research Canada disclaims any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
If you have any questions or concerns regarding these license terms, please contact us at editor@dlabi.org.