“Cloud computing an overviewâ€
-
2018-10-06 https://doi.org/10.14419/ijet.v7i4.10904 -
Cloud Computing, Deployment, Software Services, Security Issues. -
Abstract
Cloud Computing is one of the emerging technologies in all fields and is called as the type of computing relayed on the internet. The main functions of Cloud Computing are hosting and delivering of various software and services using the internet. Depending on the demands and requirements of the user, the cloud computing affords the main computational resources to users as service. The main computational resources are larger storage space, server with high performance, various operating systems for various platforms and Network. The demand for these resources by the user is increasing day by day with the main drawback of security and is considered as a very serious problem in cloud computing. This paper has surveyed the various concepts related to cloud computing such as, the architecture, types and models for deployment, applications, advantages and disadvantages. The main goal of this paper is to provide a better knowledge about the cloud computing and its issues in the research on various domains.
Â
Â
-
References
[1] Mandeep Kaur, Manish Mahajan “Using encryption Algorithms to enhance the Data Security in Cloud Computingâ€, “International journal of communication and Computer technologyâ€, Volume1, Issue3, Jan 2013.
[2] Dr.A.Padmapriya, P.Subhasri, “Cloud Computing: Reverse Caesar Cipher Algorithm to Increase Data Securityâ€, “International Journal of Engineering Trends and Technology (IJETT)â€, Volume4, Issue4- April 2013.
[3] Aarti P Pimpalkar, Prof. H.A. Hingoliwala , ‘A Secure Cloud Storage System with Secure Data Forwarding’, “International Journal of Scientific & Engineering Researchâ€,Volume4,Issue6, June-2013, page no-3002-3010.
[4] Sanjoli Singla, Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Techniqueâ€, “International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)â€,Volume2, Issue 7, July 2013.
[5] L. Arockiam1, S. Monikandan, “Data security and privacy in cloud storage using hybrid symmetric encryption algorithmâ€, “International journal of advance research in computer and communication engineeringâ€, Voumel2, Issue 8, August 2013.
[6] Anitha Y , “Securiy Issues in cloud computingâ€, “International Journal of Thesis Projects and Dissertations (IJTPD) Vol. 1, Issue 1, PP: (1-6), Month: October 2013.
[7] Parsi Kalpana ,â€Data security in cloud computing using RSA†, International Journal of Research in Computer and Communication technology,ISSN 2278-5841, Volume 1, Issue 4, September 2012.
[8] Chittaranjan Hota, Sunil Sanka, Muttukrishnan Rajarajan,SrijithK.Nair,â€Capability-based Cryptographic Data Access Control in Cloud Computingâ€, “Int. Journal of Advanced Networking and Applications†Volume: 03; Issue: 03; Pages:1152-1161 (2011) .Book.
[9] Jinesh varia,†AWS Cloud Security Best Practicesâ€,â€White Paperâ€, November 2013.
[10] Alexa Huth and James Cebula,â€Basics of cloud computingâ€, “United States of emergency leading teamsâ€,2012.
[11] Luit Infotech Private Limited,â€What is cloud computingâ€.
[12] Qi. Zhang ·Lu. Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challengesâ€, “The Brazilian Computer Societyâ€, April 2010.
[13] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- preserving public auditing for data storage security in cloud computing,†in INFOCOM, 2010, page no- 1–9. Proceeding published regularly online
[14] Vmware, â€Securing the cloud, A review of cloud computing, security implications and best practices†Miklau and D. Suciu, “Controlling access to published data using cryptography,†in Proceedings of the 29th international conference, 2011, page no- 31-46.
[15] H. Narayanan and M. Gunes, “Ensuring access control in cloud provisioned Healthcare systems,†in Consumer Communications and Networking Conference (CCNC), 2011, page no-.247–255.
-
Downloads
-
How to Cite
S, S., R. Patil, R., & C, P. (2018). “Cloud computing an overviewâ€. International Journal of Engineering & Technology, 7(4), 2743-2746. https://doi.org/10.14419/ijet.v7i4.10904Received date: 2018-04-02
Accepted date: 2018-08-13
Published date: 2018-10-06