skip to main content
research-article

Cloud Computing: State of the Art and Security Issues

Published: 03 April 2015 Publication History

Abstract

Cloud Computing is the fastest growing technology in the IT industry. It helps in providing services and resources with the help of internet. Resources are always provided by the Cloud Service Provider. Resources may be servers, storage, applications and networks. Keeping Resources in the cloud environment can be helpful in saving infrastructure cost and time for the user. Transferring the entire information of the enterprise onto the cloud contains lots of security issues and threats. This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.

References

[1]
Rajkumar Buyya, Chee Shin Yeoa, Srikumar Venugopal, James Broberg, Ivona Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility (2009).
[2]
Qi Zhang, Lu Cheng, Raouf Boutaba, Cloud computing: stateof- the-art and research challenges, Journal of Internet Services and Applications, May 2010.
[3]
Gurudatt Kulkarni, Jayant Gambhir, Tejswini Patil, Amruta Dongare, A Security Aspects in Cloud Computing (2012).
[4]
Gianmario Motta, Nicola Sfondrini and Daniele Sacco, CLOUD COMPUTING: An architectural and technological overview (2012).
[5]
Xue Jing, Zhang Jian-jun, A Brief Survey on the Security Model of Cloud Computing (2010).
[6]
Hamm Eken, Security Threats and Solutions in Cloud Computing (2013).
[7]
Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy, Cloud Computing: Security Issues and Research Challenges (2011).
[8]
Kresimir Popovic, Zeljko Hocenski, Cloud Computing security issues and challenges (2010).
[9]
Ian Foster, Carl Kesselman, The Grid: Blueprint for a New Computing Infrastructure (1999).
[10]
Jeanna N. Matthews, Eli M. Dow, Todd Deshane, Wenjin Hu, Jeremy Bongio, Patrick F. Wilbur, Brendan Johnson, Running Xen: A Hands-On Guide to the Art of Virtualization, 1 edition (2008).
[11]
R.L. Grossman, The case for Cloud Computing (2008).
[12]
Mohammad hamdaqa and Ladan tahvildari, Cloud Computing Uncovered: A Research Landscape, 2012.
[13]
NIST Cloud Computing Standards Roadmap Working Group, NIST Cloud Computing Program, Information Technology Laboratory, NIST Cloud Computing Standards Roadmap, July 2013.
[14]
Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max Mühlhäuser, Trust as a facilitator in cloud computing: a survey, 2012.
[15]
Jingwei Huang and David M Nicol, Trust mechanisms for cloud computing, 2013.
[16]
E. Aruna, A. Abirami Shri, Ajanthaa Lakkshmanan, Security Concerns and risk at different levels in Cloud Computing, 2013.
[17]
Ahmed Shawish and Maria Salama, Cloud Computing: Paradigms and Technologies, 2014.
[18]
Jaydip Sen, Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA, Security and Privacy Issues in Cloud Computing.
[19]
Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi, A quantitative analysis of current security concerns and solutions for cloud computing 2012.
[20]
Cloud Computing on Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing, 21 May 2014.
[21]
The NIST definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[22]
The Notorious Nine Cloud Computing Top Threats in 2013, https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf (2011).
[23]
Guidelines on Security and Privacy in Public Cloud, https://downloads.cloudsecurityalliance.org/initiatives/guidance/NIST-Draft-SP-800-144_cloud-computing.pdf (2011).
[24]
Gehana Booth, Andrew Soknacki, and Anil Somayaji, Cloud Security: Attacks and Current Defenses, http://www.albany.edu/iasymposium/proceedings/2013/16-BoothSoknackiSomayaji.pdf (2013).
[25]
Safecode/csa: practices for secure development of cloud applications, https://downloads.cloudsecurityalliance.org/initiatives/collaborate/safecode/SAFECode-CSA-Cloud-White-Paper.pdf (2013).
[26]
VMware, http://www.vmware.com/in/products.html
[27]
XenSource,http://www.citrix.com/products/xenserver/overview.html
[28]
Google App Engine, https://cloud.google.com/products/appengine/
[29]
Salesforce.com,http://www.salesforce.com/in/crm/products.jsp
[30]
Google Mail,https://www.google.co.in/intl/en/policies/terms/regional.html
[31]
Amazon EC2, http://aws.amazon.com/ec2/
[32]
Microsoft Azure, http://azure.microsoft.com/enus/documentation/
[33]
The benefits and challenges of cloud computing, http://www.moorestephens.com/cloud_computing_benefits_challenges.aspx, 21 May 2014.
[34]
IBM Connections, www.ibm.com/software/products/en/conn
[35]
DeskAway, www.deskaway.com
[36]
HyperOffice, www.hyperoffice.com
[37]
Brightpod, www.brightpod.com
[38]
Microsoft SharePoint, office.microsoft.com/en-in/sharepoint/
[39]
Zoho Office Suite, www.zoho.com
[40]
Workbooks.com, www.workbooks.com
[41]
Microsoft Dynamics CRM, http://www.microsoft.com/enin/dynamics/crm.aspx
[42]
TeamWox, http://www.teamwox.com/en
[43]
Nutshell CRM, https://www.nutshell.com/
[44]
Enonic, www.enonic.com
[45]
Daisy CMS, www.daisycrm.org
[46]
mojoPortal, www.mojoportal.com
[47]
Drupal, https://www.drupal.org
[48]
OpenTextECMSuite, http://www.opentext.com/what-wedo/products/opentext-ecm-suite
[49]
Apache OFBiz, ofbiz.apache.org
[50]
FinancialForce.com, www.financialforce.com
[51]
Microsoft Dynamics NAV, http://www.microsoft.com/enus/dynamics/erp-nav-overview.aspx
[52]
NetSuite, www.netsuite.com
[53]
Tally, www.tallysolutions.com
[54]
AWS Elastic Beanstalk, http://aws.amazon.com/elasticbeanstalk/
[55]
Engine Yard, https://www.engineyard.com/
[56]
Heroku, https://www.heroku.com/
[57]
OpenShift, https://www.openshift.com/
[58]
GoGrid, www.gogrid.com
[59]
Eucalyptus, https://www.eucalyptus.com/
[60]
Google Cloud Platform, https://cloud.google.com/products/cloud-storage/
[61]
Joyent, https://www.joyent.com/
[62]
Rackspace, www.rackspace.com
[63]
FrontAccounting ERP, http://frontaccounting.com/

Cited By

View all
  • (2023)A Method based on Multi-agent Systems and Passive Replication Technique for Predicting Failures in Cloud ComputingRecent Advances in Computer Science and Communications10.2174/266625581566622042909232416:1Online publication date: Jan-2023
  • (2023)Facing the era of smartness – delivering excellent smart hospitality experiences through cloud computingJournal of Hospitality Marketing & Management10.1080/19368623.2023.225114433:3(333-359)Online publication date: 28-Aug-2023
  • (2021)Role of Recent Technologies in Cognitive SystemsCognitive Engineering for Next Generation Computing10.1002/9781119711308.ch9(231-264)Online publication date: 3-May-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 40, Issue 2
March 2015
125 pages
ISSN:0163-5948
DOI:10.1145/2735399
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 April 2015
Published in SIGSOFT Volume 40, Issue 2

Check for updates

Author Tags

  1. Cloud Architecture
  2. Cloud Computing
  3. Entities

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Method based on Multi-agent Systems and Passive Replication Technique for Predicting Failures in Cloud ComputingRecent Advances in Computer Science and Communications10.2174/266625581566622042909232416:1Online publication date: Jan-2023
  • (2023)Facing the era of smartness – delivering excellent smart hospitality experiences through cloud computingJournal of Hospitality Marketing & Management10.1080/19368623.2023.225114433:3(333-359)Online publication date: 28-Aug-2023
  • (2021)Role of Recent Technologies in Cognitive SystemsCognitive Engineering for Next Generation Computing10.1002/9781119711308.ch9(231-264)Online publication date: 3-May-2021
  • (2019)Evaluation Theory for Characteristics of Cloud Identity Trust FrameworkCloud Computing - Technology and Practices10.5772/intechopen.76338Online publication date: 3-Jan-2019
  • (2018)Cloud Resellers on Bazaar-Based Cloud Markets2018 IEEE 11th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD.2018.00078(564-571)Online publication date: Jul-2018
  • (2018)Challenges of cloud computing use: A systematic literature reviewMATEC Web of Conferences10.1051/matecconf/201820000007200(00007)Online publication date: 14-Sep-2018
  • (2018)Simulating Negotiation-Based Cloud MarketsComputational Science – ICCS 201810.1007/978-3-319-93698-7_51(664-677)Online publication date: 11-Jun-2018
  • (2018)Classifying Cloud Computing Challenges: A Taxonomy ProposalTrends and Advances in Information Systems and Technologies10.1007/978-3-319-77703-0_85(877-886)Online publication date: 2018
  • (2017)Improved phrase search construction over encrypted data in cloud storageInternational Journal of Innovative Computing and Applications10.1504/IJICA.2017.0824928:1(3-11)Online publication date: 1-Jan-2017
  • (2017)Improved One-Round Phrase Search Schemes Over Symmetrically Encrypted Data in Storage Outsourcing SystemIndustrial IoT Technologies and Applications10.1007/978-3-319-60753-5_22(205-213)Online publication date: 19-Aug-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media