In-depth Analysis of Cloud Computing Architectures, Deployment Models, Security Issues, Virtualization Technologies, and Cloud-Based Services

Authors

  • Vicrumnaug Vuppalapaty Technical Architect, CodeScience Inc. USA Author

Keywords:

Cloud computing, architecture, challenges, cloud platforms, research issues

Abstract

Cloud computing is the development of parallel computing, distributed computing, grid computing and virtualization technologies which define the shape of a new era. Cloud computing is an emerging model of business computing. In this paper, we explore the concept of cloud architecture and compare cloud computing with grid computing. We also address the characteristics and applications of several popular cloud computing platforms. In this paper, we aim to pinpoint the challenges and issues of cloud computing. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems. In this paper, we investigate several cloud computing system providers about their concerns on security and privacy issues.

Downloads

Download data is not yet available.

References

T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010

M. Q. Zhou, R. Zhang, W. Xie, W. N. Qian, and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” 2010 Sixth InternationalConference on Semantics, Knowledge and Grids(SKG), pp.105-112, DOI= 1-3 Nov. 20 10

J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan pp. 1-3, DOI= 10-12 Dec. 2010.

S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-97. DOI=10.1109/ICFN.2010. 58.

J. J. Peng, X. J. Zhang, Z. Lei, B. F. Zhang, W. Zhang, and Q. Li, “Comparison of Several Cloud Computing Platforms,” 2009 Second International Symposium on Information Science and Engineering (ISISE '09). IEEE Computer Society, Washington, DC, USA, pp. 23-27, DOI=10.1109/ISISE.2009.94.

S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The Comparison between Cloud Computing and Grid Computing,” 2010 International Conference on Computer Application and System Modeling (ICCASM), pp. V11-72 - V11-75, DOI= 22-24 Oct. 2010.

M. M. Alabbadi, “Cloud Computing for Education and Learning: Education and Learning as a Service (ELaaS),” 2011 14th International Conference on Interactive Collaborative Learning (ICL), pp. 589 – 594, DOI=21-23 Sept. 2011.

P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.

P. Mell and T. Grance, “Draft nist working definition of cloud computing - vol. 21, Aug 2009, 2009.

“Sun Microsystems Unveils Open Cloud Platform,” [Online]. Available:

http://www.sun.com/aboutsun/pr/2009-03/sunflash.20090318.2.xml,2 009.

W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a Service Security: Challenges and Solutions,” 2010 7th International Conference on Informatics and System, pp. 1-8, March 2010.

W. Itani, A. Kayssi, and A. Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures,” 2009 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.

B. Grobauer, T. Walloschek, and E. Stöcker, “Understanding Cloud Computing Vulnerabilities,” 2011 IEEE Security and Privacy, pp. 50-57, DOI= March/April 2011.

W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” Proceedings of the 44th Hawaii International Conference on System Sciences, 2011.

Almond, Carl., "A practical guide to cloud computing security," A white paper from Accenture and Microsoft, pp. 3-9, 2009.

Basson, Benhardus., "The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment," PhD theisis., Stellenbosch:Stellenbosch University, pp. 1-67, 2014.

Srinivasamurthy, Shilpashree, D. Liu., "Survey on Cloud Computing Security," In Proc. Conf. on Cloud Computing, Cloud Com, vol. 10. Pp. 412-421, 2010.

Dillon, Tharam, C. Wu, E. Chang,” Cloud computing: issues and challenges,” In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pp. 27-33. IEEE, 2010

Singhal, Paridhi., “Data Security Models in Cloud Computing,” International Journal of Scientific & Engineering Research, Vol. 4, No. 6, pp. 789-793, Jun. 2013.

Carlin, Sean, K. Curran., "Cloud computing security,” International Journal of Ambient Computing and Intelligence (IJACI) 3, no. 1, pp. 14-19, 2011. Article (CrossRef Link)

Srivastava, Prashant, S. Singh, A. Alfred Pinto, S. Verma, Vijay K. Chaurasiya, Rahul Gupta., “An architecture based on proactive model for security in cloud computing,” In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, pp. 661-666. IEEE, 2011.

Al-Anzi, Fawaz S., Sumit Kr Yadav, J. Soni, “Cloud computing: Security model comprising governance, risk management and compliance,” In Data Mining and Intelligent Computing (ICDMIC), 2014International Conference on, pp. 1-6. IEEE, 2014

Blakstad, Kåre Marius, M. Andreassen., "Security in Cloud Computing: A Security Assessment of Cloud Computing Providers for an Online Receipt Storage,” pp. 1- 103, 2010.

Padhy, Rabi Prasad, M. R. Patra, S. Chandra Satapathy., "Cloud Computing: Security Issues and Research Challenges,” International Journal of Computer Science and Information Technology &Security (IJCSITS) 1, no. 2, pp. 136-146, 2011.

Khalil, Issa M., A. Khreishah, S. Bouktif, A. Ahmad., “Security concerns in cloud computing," In Information Technology: New Generations (ITNG), 2013 Tenth International Conference on, IEEE, pp. 411-416, 2013. Article (CrossRef Link)

Mewed, Shiva Zhang, Rui, Ling Liu., "Security models and requirements for healthcare application clouds,” In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pp. 268-275. IEEE, 2010.

U. Kumar Singh, P. Sharma., "Security Based Model for Cloud Computing,” Int. Journal of Computer Networks and Wireless Communications (IJCNWC) 1, no. 1, pp. 13-19, 2011.

Vaquero, LuisM., L. R. –M, Daniel Morán., “Locking the sky: a survey on IaaS cloud security,” Computing 91, no. 1, pp. 93-118, 2011. Article (CrossRef Link)

Aliabad, Mohsen M., “Cloud computing for education and learning: Education and learning as a service(ELaaS),” In Interactive Collaborative Learning (ICL), 2011 14th International Conference on, pp. 589-594. IEEE, 2011.

Vijay.G.R, Dr.A.Rama Mohan Reddy., "Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study," Computer Engineering and Intelligent Systems, Vol.5, No.7, pp 23-30, 2014

Downloads

Published

08-07-2022

How to Cite

[1]
V. Vuppalapaty, “In-depth Analysis of Cloud Computing Architectures, Deployment Models, Security Issues, Virtualization Technologies, and Cloud-Based Services ”, Distrib Learn Broad Appl Sci Res, vol. 8, pp. 135–153, Jul. 2022, Accessed: Nov. 22, 2024. [Online]. Available: https://dlabi.org/index.php/journal/article/view/114

Similar Articles

71-80 of 165

You may also start an advanced similarity search for this article.