ISSUES AND CHALLENGES IN ADOPTION OF CLOUD ENVIRONMENT

Authors

  • Nitin Nagar Assistant Professor, IIPS, DAVV, Indore

Keywords:

computing, Deployment

Abstract

Cloud computing is one of the important research aspects of distributed computing in the emergence of information technology. Cloud computing refers to services, applications, and data storage delivered online through powerful file servers. Deployment of cloud computing depends on whether the cloud is a private, community, public, or hybrid one. Private clouds are operated for a particular organization, whereas community clouds are mutual by a number of organizations. Public clouds are available to the common public or large groups of Industries, while hybrid clouds combine public and private elements in the same data center. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.

References

Entire Deniz Sarier, “A new approach for Biometric Templates storage and Remote Authentication”, ICB’09:Proceeding of the 3rd International workshop on Advances in Biometrics, Volume 5558/2009, June 2009, pp 909-918.

Harold C. Lim et al, “Automated Control in Cloud Computing: Challenges and Opportunities”, ACDC’09, June 19, 2009, Barcelona, Spain, pp 13-18.

Siani Pearson, “Taking Account of privacy when designing Cloud Computing”, Cloud 09, May 23, 2009, pp.44-52.

D. Kesavaroja, R.Balasubramaniam et al, “Implementation of Cloud Data Server (CDS) for providing secure services in E-Business”, IJDMS, 2005, pp. 18-21.

Wenchao Zhou et al., “Toward-a Data Centric View of Security”, CloudDB 2010, October 30, 2010, Ontario, Canada, pp. 25-32.

Francis Hsu and Hao Chen, “Secure File System Services for Web 2.0 Application”, CCSW’09, November 13, 2009, Chicago, Illinois, USA, pp. 11-17.

John Foley, Private Cloud Take Shape, Information Week Analysis, Aug 9, 2009.

Alan Radding, Private Cloud on Horizon, Information Week Analysis, April 13, 2009.

M. et al., “Data Location and Security Issues in Cloud Computing”, IEEE International Conference on Emerging intelligent Data and Web Technologies, 2011.

B. et al., “Emerging Security Challenges in Cloud Computing”, IEEE international Conference Information and Communication Technologies (WICT), 2011.

D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, IEEE International conference on Computer Science and Electronics Engineering, 2012.

P.et al., Cloud Computing security issues and challenges, MIPRO, Proceedings of the 33rd International Convention, 2010.

S. et al., “Security Threats in Cloud Computing”, 6th international Conference on Internet Technologies and Secure Transactions, 2011.

J. Harauz et al., “Data Security in the World of Cloud Computing Security & Privacy”, IEEE 7 (4), pp 61-64.

Z. Shen et al., “Cloud Computing System based on Trusted Computing Platform”, International Conference on Intelligent Computation technology and Automation, 2010.

K.G.Kumar et al., “To Achieve Trust in the Cloud”, Second International Conference on Advanced Computing & Communication Technologies, 2012.

B. Zou and H. Zhang, “Toward Enhancing Trust in Cloud Computing Environment”, 2nd International Conference on Control, Instrumentation and Automation, 2011.

K. M. Khan et al., “Establishing Trust in Cloud Computing”, Cloud Computing, pp. 20-27, 2010.

W. Li, L. Ping and X. Pan, “Use Trust management module to achieve effective security mechanisms in cloud environment”, International Conference on Electronics and Information Engineering, 2010.

H. Takabi, D Joshi and G. Ahn, “SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environment”, 34th Annual IEEE Computer Software and Applications Conference Workshops, 2010.

S. M. Habib, et al., “Towards Trust Management System for Cloud Computing”, IEEE Computer Society, Washington DC, USA, 2011.

H. Sato et al., “A Cloud Trust Model in a Security Aware Cloud”, 10th Annual International Symposium on Applications and the Internet, 2010.

S. Nivetha et al.,”Assessing the Risks and Opportunities of Cloud Computing - Defining Identity Management Systems and Maturity Models”, in International Conference on Computing and Control Engineering, 2012.

B. Clifford et al., “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications, September 1994.

John T. et al., “The Evolution of the Kerberos Authentication System”, Distributed open systems. IEEE Computer Society Press, Washington, pp. 78–94, 1994.

Revar, A.G.; Bhavsar, M.D., “Securing User Authentication using Single Sign-on in Cloud Computing”, Engineering (NUiCONE), 2011 Nirma University International Conference on , vol., no., pp.1-4, 8-10 Dec. 2011.

C. Leckie, K. Ramamohanarao T. Peng, "Survey of network-based defense mechanisms countering the DoS and DDoS problems", ACM Computer Survey, 39 (1) (2007), p. 3.

Nitin Nagar and Ugrasen Suman, "Architectural Comparison and Implementation of Cloud Tools and Technologies," in 4th International Conference on Electronics Computer Technology (ICECT 2012), KanyaKumari,INDIA, 2012, pp. 581-585.

Downloads

Published

2015-06-30

Issue

Section

Articles