Cloud Computing a Potential to Change IT

Authors

  •   S. Sumanth Department of Computer Science, Smt. V.H.D. Central Institute of Home Science (Autonomous), Bengaluru
  •   N. G. Yethiraj Department of Computer Science, Maharani’s Science College for Women, Bengaluru

DOI:

https://doi.org/10.21095/ajmr/2017/v0/i0/122259

Keywords:

Cloud Computing, IT, Infrastructure, Scalability.

Abstract

Cloud computing is an emerging technology in IT world. It is a set of IT services such as software's, applications and hardware resources that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure.

To mention few advantages it includes scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud Computing initiatives could affect the enterprises within two to three years as it has the potential to significantly change IT. The major issue and the most of the research are carried on the security issues which hampers the growth of cloud. This paper provides a survey of the security challenges focusing on the cloud computing types and the service delivery types.

Downloads

Published

2017-12-01

How to Cite

Sumanth, S., & Yethiraj, N. G. (2017). Cloud Computing a Potential to Change IT. Adarsh Journal of Management Research, 16–22. https://doi.org/10.21095/ajmr/2017/v0/i0/122259

References

Mell, P., Grance, T. (2009) The NIST Definition of Cloud Computing Version 15. NIST

The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014 by AndrasCser and Ed Ferrara, November 17, 2014

S. O. Kuyoro, F. Ibikunle and O. Awodele, “Cloud Computing Security Issues and Challengesâ€, International Journal of Computer Networks (IJCN), vol. 3, Issue 5, (2011).

K. opovi and Z. Hocenski, “Cloud computing security issues and challengesâ€, MIPRO, 2010 Proceedings of the 33rd International Convention, (2010)May 24-28.

D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computingâ€, International Conference on Computer Science and Electronics Engineering (ICCSEE), (2012)March 23-25.

M. Al Morsy, J. Grundy and I. Müller, “An Analysis of The Cloud Computing Security Problemâ€, In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, (2010), November 30.

Soeung-Kon, J. -H. Lee and S. W. Kim, “Mobile Cloud Computing Security Considerationsâ€, Journal of Security Engineering, no. 9, (2012)April.

Yumerefendi, A.R., Chase, J.S., “Strong accountability for network storageâ€. ACM Trans. Storage (TOS), Volume 3 Issue 3, October 2007, pp.382-401.

Minqi Z; Rong Z; Wei X; Weining Q; Aoying Z, “Security and Privacy in Cloud Computing: A Surveyâ€, Sixth international conference on Semantics Knowledge and Grid (SKG), Nov. 1-3 ,2010, pp. 105.

JansenWayne, GranceTimothy, “Guidelines on security and privacy in public Cloud computingâ€, NIST, Special Publication 800-144, Dec 2011, pp.35

KashifMunir, SellapanPalaniappan, “Secure Cloud Architectureâ€, Advanced Computing: An International Journal (ACIJ), Vol.4, No.1, January 2013, pp.13.

AmitSangroya, Saurabh Kumar, JaideepDhok, and VasudevaVarma, “Towards Analyzing Data Security Risks in Cloud Computing Environmentsâ€, Springer-Verlag Berlin Heidelberg 2010, pp. 255-265.

Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, “A Taxonomy and Survey of Cloud Computing Systemsâ€, 978-0- 7695-3769-6/09, IEEE, pp: 44 – 51.

John Viega, “Cloud Computing and the Common Manâ€, IEEE, 0018-9162/09, pp: 106 – 108.

H. Takabi, J.B.D. Joshi, and G.-J. Ahn, “SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments,†Proc. 1st IEEE Int’l Workshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010, pp. 393–398.

S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,†In Proceedings of the 2010 Second International Conference on Future Networks (ICFN ’10). IEEE Computer Society, Washington, DC, USA, pp. 93-97. DOI=10.1109/ICFN.2010. 58.