Abstract
Cloud Computing is the fastest growing technology in the IT industry. It helps in providing services and resources with the help of internet. Resources are always provided by the Cloud Service Provider. Resources may be servers, storage, applications and networks. Keeping Resources in the cloud environment can be helpful in saving infrastructure cost and time for the user. Transferring the entire information of the enterprise onto the cloud contains lots of security issues and threats. This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.
- Rajkumar Buyya, Chee Shin Yeoa, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility (2009).Google Scholar
- Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud computing: stateof- the-art and research challenges, Journal of Internet Services and Applications, May 2010.Google Scholar
- Gurudatt Kulkarni, Jayant Gambhir, Tejswini Patil, Amruta Dongare, A Security Aspects in Cloud Computing (2012).Google Scholar
- Gianmario Motta, Nicola Sfondrini and Daniele Sacco, CLOUD COMPUTING: An architectural and technological overview (2012).Google Scholar
- Xue Jing, Zhang Jian-jun, A Brief Survey on the Security Model of Cloud Computing (2010).Google Scholar
- Hamm Eken, Security Threats and Solutions in Cloud Computing (2013).Google Scholar
- Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, Cloud Computing: Security Issues and Research Challenges (2011).Google Scholar
- Kresimir Popovic, Zeljko Hocenski, Cloud Computing security issues and challenges (2010).Google Scholar
- Ian Foster, Carl Kesselman, The Grid: Blueprint for a New Computing Infrastructure (1999). Google ScholarDigital Library
- Jeanna N. Matthews, Eli M. Dow, Todd Deshane, Wenjin Hu, Jeremy Bongio, Patrick F. Wilbur, Brendan Johnson, Running Xen: A Hands-On Guide to the Art of Virtualization, 1 edition (2008). Google ScholarDigital Library
- R.L. Grossman, The case for Cloud Computing (2008).Google Scholar
- Mohammad hamdaqa and Ladan tahvildari, Cloud Computing Uncovered: A Research Landscape, 2012.Google Scholar
- NIST Cloud Computing Standards Roadmap Working Group, NIST Cloud Computing Program, Information Technology Laboratory, NIST Cloud Computing Standards Roadmap, July 2013.Google Scholar
- Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max Mühlhäuser, Trust as a facilitator in cloud computing: a survey, 2012.Google Scholar
- Jingwei Huang and David M Nicol, Trust mechanisms for cloud computing, 2013.Google Scholar
- E. Aruna, A. Abirami Shri, Ajanthaa Lakkshmanan, Security Concerns and risk at different levels in Cloud Computing, 2013.Google Scholar
- Ahmed Shawish and Maria Salama, Cloud Computing: Paradigms and Technologies, 2014.Google Scholar
- Jaydip Sen, Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA, Security and Privacy Issues in Cloud Computing.Google Scholar
- Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing 2012.Google Scholar
- Cloud Computing on Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, 21 May 2014.Google Scholar
- The NIST definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfGoogle Scholar
- The Notorious Nine Cloud Computing Top Threats in 2013, https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf (2011).Google Scholar
- Guidelines on Security and Privacy in Public Cloud, https://downloads.cloudsecurityalliance.org/initiatives/guidance/NIST-Draft-SP-800-144_cloud-computing.pdf (2011).Google Scholar
- Gehana Booth, Andrew Soknacki, and Anil Somayaji, Cloud Security: Attacks and Current Defenses, http://www.albany.edu/iasymposium/proceedings/2013/16-BoothSoknackiSomayaji.pdf (2013).Google Scholar
- Safecode/csa: practices for secure development of cloud applications, https://downloads.cloudsecurityalliance.org/initiatives/collaborate/safecode/SAFECode-CSA-Cloud-White-Paper.pdf (2013).Google Scholar
- VMware, http://www.vmware.com/in/products.htmlGoogle Scholar
- XenSource,http://www.citrix.com/products/xenserver/overview.htmlGoogle Scholar
- Google App Engine, https://cloud.google.com/products/appengine/Google Scholar
- Salesforce.com,http://www.salesforce.com/in/crm/products.jspGoogle Scholar
- Google Mail,https://www.google.co.in/intl/en/policies/terms/regional.htmlGoogle Scholar
- Amazon EC2, http://aws.amazon.com/ec2/Google Scholar
- Microsoft Azure, http://azure.microsoft.com/enus/documentation/Google Scholar
- The benefits and challenges of cloud computing, http://www.moorestephens.com/cloud_computing_benefits_challenges.aspx, 21 May 2014.Google Scholar
- IBM Connections, www.ibm.com/software/products/en/connGoogle Scholar
- DeskAway, www.deskaway.comGoogle Scholar
- HyperOffice, www.hyperoffice.comGoogle Scholar
- Brightpod, www.brightpod.comGoogle Scholar
- Microsoft SharePoint, office.microsoft.com/en-in/sharepoint/Google Scholar
- Zoho Office Suite, www.zoho.comGoogle Scholar
- Workbooks.com, www.workbooks.comGoogle Scholar
- Microsoft Dynamics CRM, http://www.microsoft.com/enin/dynamics/crm.aspxGoogle Scholar
- TeamWox, http://www.teamwox.com/enGoogle Scholar
- Nutshell CRM, https://www.nutshell.com/Google Scholar
- Enonic, www.enonic.comGoogle Scholar
- Daisy CMS, www.daisycrm.orgGoogle Scholar
- mojoPortal, www.mojoportal.comGoogle Scholar
- Drupal, https://www.drupal.orgGoogle Scholar
- OpenTextECMSuite, http://www.opentext.com/what-wedo/products/opentext-ecm-suiteGoogle Scholar
- Apache OFBiz, ofbiz.apache.orgGoogle Scholar
- FinancialForce.com, www.financialforce.comGoogle Scholar
- Microsoft Dynamics NAV, http://www.microsoft.com/enus/dynamics/erp-nav-overview.aspxGoogle Scholar
- NetSuite, www.netsuite.comGoogle Scholar
- Tally, www.tallysolutions.comGoogle Scholar
- AWS Elastic Beanstalk, http://aws.amazon.com/elasticbeanstalk/Google Scholar
- Engine Yard, https://www.engineyard.com/Google Scholar
- Heroku, https://www.heroku.com/Google Scholar
- OpenShift, https://www.openshift.com/Google Scholar
- GoGrid, www.gogrid.comGoogle Scholar
- Eucalyptus, https://www.eucalyptus.com/Google Scholar
- Google Cloud Platform, https://cloud.google.com/products/cloud-storage/Google Scholar
- Joyent, https://www.joyent.com/Google Scholar
- Rackspace, www.rackspace.comGoogle Scholar
- FrontAccounting ERP, http://frontaccounting.com/Google Scholar
Index Terms
- Cloud Computing: State of the Art and Security Issues
Recommendations
Cloud architecture: a preliminary look
iiWAS '11: Proceedings of the 13th International Conference on Information Integration and Web-based Applications and ServicesCloud computing has started taking root. Many vendors provide Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). SaaS and PaaS are provided on top of an IaaS infrastructure. Different vendors have ...
Cloud architecture: a preliminary look
MoMM '11: Proceedings of the 9th International Conference on Advances in Mobile Computing and MultimediaCloud computing has started taking root. Many vendors provide Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). SaaS and PaaS are provided on top of an IaaS infrastructure. Different vendors have ...
A Conceptual Platform of SLA in Cloud Computing
DASC '11: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure ComputingCloud computing is a promising technology, where the infrastructure, developing platform, software and storage are delivered as a service. With the development of cloud computing, more and more cloud service providers emerge. However, there are no ...
Comments