skip to main content
research-article

Cloud Computing: State of the Art and Security Issues

Authors Info & Claims
Published:03 April 2015Publication History
Skip Abstract Section

Abstract

Cloud Computing is the fastest growing technology in the IT industry. It helps in providing services and resources with the help of internet. Resources are always provided by the Cloud Service Provider. Resources may be servers, storage, applications and networks. Keeping Resources in the cloud environment can be helpful in saving infrastructure cost and time for the user. Transferring the entire information of the enterprise onto the cloud contains lots of security issues and threats. This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.

References

  1. Rajkumar Buyya, Chee Shin Yeoa, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility (2009).Google ScholarGoogle Scholar
  2. Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud computing: stateof- the-art and research challenges, Journal of Internet Services and Applications, May 2010.Google ScholarGoogle Scholar
  3. Gurudatt Kulkarni, Jayant Gambhir, Tejswini Patil, Amruta Dongare, A Security Aspects in Cloud Computing (2012).Google ScholarGoogle Scholar
  4. Gianmario Motta, Nicola Sfondrini and Daniele Sacco, CLOUD COMPUTING: An architectural and technological overview (2012).Google ScholarGoogle Scholar
  5. Xue Jing, Zhang Jian-jun, A Brief Survey on the Security Model of Cloud Computing (2010).Google ScholarGoogle Scholar
  6. Hamm Eken, Security Threats and Solutions in Cloud Computing (2013).Google ScholarGoogle Scholar
  7. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, Cloud Computing: Security Issues and Research Challenges (2011).Google ScholarGoogle Scholar
  8. Kresimir Popovic, Zeljko Hocenski, Cloud Computing security issues and challenges (2010).Google ScholarGoogle Scholar
  9. Ian Foster, Carl Kesselman, The Grid: Blueprint for a New Computing Infrastructure (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jeanna N. Matthews, Eli M. Dow, Todd Deshane, Wenjin Hu, Jeremy Bongio, Patrick F. Wilbur, Brendan Johnson, Running Xen: A Hands-On Guide to the Art of Virtualization, 1 edition (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R.L. Grossman, The case for Cloud Computing (2008).Google ScholarGoogle Scholar
  12. Mohammad hamdaqa and Ladan tahvildari, Cloud Computing Uncovered: A Research Landscape, 2012.Google ScholarGoogle Scholar
  13. NIST Cloud Computing Standards Roadmap Working Group, NIST Cloud Computing Program, Information Technology Laboratory, NIST Cloud Computing Standards Roadmap, July 2013.Google ScholarGoogle Scholar
  14. Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max Mühlhäuser, Trust as a facilitator in cloud computing: a survey, 2012.Google ScholarGoogle Scholar
  15. Jingwei Huang and David M Nicol, Trust mechanisms for cloud computing, 2013.Google ScholarGoogle Scholar
  16. E. Aruna, A. Abirami Shri, Ajanthaa Lakkshmanan, Security Concerns and risk at different levels in Cloud Computing, 2013.Google ScholarGoogle Scholar
  17. Ahmed Shawish and Maria Salama, Cloud Computing: Paradigms and Technologies, 2014.Google ScholarGoogle Scholar
  18. Jaydip Sen, Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA, Security and Privacy Issues in Cloud Computing.Google ScholarGoogle Scholar
  19. Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing 2012.Google ScholarGoogle Scholar
  20. Cloud Computing on Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, 21 May 2014.Google ScholarGoogle Scholar
  21. The NIST definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfGoogle ScholarGoogle Scholar
  22. The Notorious Nine Cloud Computing Top Threats in 2013, https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf (2011).Google ScholarGoogle Scholar
  23. Guidelines on Security and Privacy in Public Cloud, https://downloads.cloudsecurityalliance.org/initiatives/guidance/NIST-Draft-SP-800-144_cloud-computing.pdf (2011).Google ScholarGoogle Scholar
  24. Gehana Booth, Andrew Soknacki, and Anil Somayaji, Cloud Security: Attacks and Current Defenses, http://www.albany.edu/iasymposium/proceedings/2013/16-BoothSoknackiSomayaji.pdf (2013).Google ScholarGoogle Scholar
  25. Safecode/csa: practices for secure development of cloud applications, https://downloads.cloudsecurityalliance.org/initiatives/collaborate/safecode/SAFECode-CSA-Cloud-White-Paper.pdf (2013).Google ScholarGoogle Scholar
  26. VMware, http://www.vmware.com/in/products.htmlGoogle ScholarGoogle Scholar
  27. XenSource,http://www.citrix.com/products/xenserver/overview.htmlGoogle ScholarGoogle Scholar
  28. Google App Engine, https://cloud.google.com/products/appengine/Google ScholarGoogle Scholar
  29. Salesforce.com,http://www.salesforce.com/in/crm/products.jspGoogle ScholarGoogle Scholar
  30. Google Mail,https://www.google.co.in/intl/en/policies/terms/regional.htmlGoogle ScholarGoogle Scholar
  31. Amazon EC2, http://aws.amazon.com/ec2/Google ScholarGoogle Scholar
  32. Microsoft Azure, http://azure.microsoft.com/enus/documentation/Google ScholarGoogle Scholar
  33. The benefits and challenges of cloud computing, http://www.moorestephens.com/cloud_computing_benefits_challenges.aspx, 21 May 2014.Google ScholarGoogle Scholar
  34. IBM Connections, www.ibm.com/software/products/en/connGoogle ScholarGoogle Scholar
  35. DeskAway, www.deskaway.comGoogle ScholarGoogle Scholar
  36. HyperOffice, www.hyperoffice.comGoogle ScholarGoogle Scholar
  37. Brightpod, www.brightpod.comGoogle ScholarGoogle Scholar
  38. Microsoft SharePoint, office.microsoft.com/en-in/sharepoint/Google ScholarGoogle Scholar
  39. Zoho Office Suite, www.zoho.comGoogle ScholarGoogle Scholar
  40. Workbooks.com, www.workbooks.comGoogle ScholarGoogle Scholar
  41. Microsoft Dynamics CRM, http://www.microsoft.com/enin/dynamics/crm.aspxGoogle ScholarGoogle Scholar
  42. TeamWox, http://www.teamwox.com/enGoogle ScholarGoogle Scholar
  43. Nutshell CRM, https://www.nutshell.com/Google ScholarGoogle Scholar
  44. Enonic, www.enonic.comGoogle ScholarGoogle Scholar
  45. Daisy CMS, www.daisycrm.orgGoogle ScholarGoogle Scholar
  46. mojoPortal, www.mojoportal.comGoogle ScholarGoogle Scholar
  47. Drupal, https://www.drupal.orgGoogle ScholarGoogle Scholar
  48. OpenTextECMSuite, http://www.opentext.com/what-wedo/products/opentext-ecm-suiteGoogle ScholarGoogle Scholar
  49. Apache OFBiz, ofbiz.apache.orgGoogle ScholarGoogle Scholar
  50. FinancialForce.com, www.financialforce.comGoogle ScholarGoogle Scholar
  51. Microsoft Dynamics NAV, http://www.microsoft.com/enus/dynamics/erp-nav-overview.aspxGoogle ScholarGoogle Scholar
  52. NetSuite, www.netsuite.comGoogle ScholarGoogle Scholar
  53. Tally, www.tallysolutions.comGoogle ScholarGoogle Scholar
  54. AWS Elastic Beanstalk, http://aws.amazon.com/elasticbeanstalk/Google ScholarGoogle Scholar
  55. Engine Yard, https://www.engineyard.com/Google ScholarGoogle Scholar
  56. Heroku, https://www.heroku.com/Google ScholarGoogle Scholar
  57. OpenShift, https://www.openshift.com/Google ScholarGoogle Scholar
  58. GoGrid, www.gogrid.comGoogle ScholarGoogle Scholar
  59. Eucalyptus, https://www.eucalyptus.com/Google ScholarGoogle Scholar
  60. Google Cloud Platform, https://cloud.google.com/products/cloud-storage/Google ScholarGoogle Scholar
  61. Joyent, https://www.joyent.com/Google ScholarGoogle Scholar
  62. Rackspace, www.rackspace.comGoogle ScholarGoogle Scholar
  63. FrontAccounting ERP, http://frontaccounting.com/Google ScholarGoogle Scholar

Index Terms

  1. Cloud Computing: State of the Art and Security Issues

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader