B. Krishna
D. Madhan
U. Udayakumar
K. Sutha
- Student, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
- Student, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
- Assistant Professor, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
- Assistant Professor, Department of Computer Science & Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India
Abstract
These days, cloud computing is expanding quickly in the IT sector, offering a fresh approach to managing various information systems. The rapid pace of technological advancement highlights the importance of embracing and leveraging its advantages. Organizations transitioning to cloud-based information archiving demonstrate several key characteristics. These include enhanced IT infrastructure, the ability to manage remote access from any location in the world with a stable Internet connection, and the cost savings that come with using cloud computing. As we shift everything to a distributed environment and toward the concept of asset pooling and on-request management. Security and privacy concerns are always paramount. This document provides an in-depth exploration of issues related to cloud security. The architecture, features, delivery strategy, and stakeholders of the cloud are all taken into consideration while looking into the security problem. This paper examines some of the main security challenges related to implementing cloud-aware security solutions that might potentially safeguard the dynamic and constantly evolving cloud paradigm.
Keywords: Cloud computing, Security, networking, databases, operating systems
[This article belongs to Recent Trends in Parallel Computing(rtpc)]
References
1. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. National Institute of Standards and Technology, U.S. Department of Commerce. Special Publication 800-145. DOI: 10.6028/NIST.SP.800-145.
2. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1- 11. DOI: 10.1016/j.jnca.2010.07.006.
3. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. DOI: 10.1186/1869-0238-4-5.
4. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42-57. DOI: 10.1016/j.jnca.2012.05.003.
5. Aljawarneh, S., Aldwairi, M., Yassein, M. B. (2018). Cloud security: Challenges and future trends. Cybersecurity, 1(1), 9. DOI: 10.1186/s42400-018-0010-6.
6. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. DOI: 10.1016/j.future.2010.12.006.
7. Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud Computing: Implementation, Management, and Security. CRC Press. ISBN: 978-1-4398-0680-7.
8. Takabi, H., Joshi, J. B. D., & Ahn, G. J. (2010). Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy, 8(6), 24-31. DOI: 10.1109/MSP.2010.186.
9. December 2017 – DOI:10.1109/ICCES.2017.8275295, Conference: 2017,12th International Conference on Computer Engineering and Systems (ICCES). Authors: Ayman M. El-Zoghby, Marianne A. Azer, National Telecommunication Institute, Egypt.
10. Santosh Bulusu 880216-5798, Computer Intel Neurosci. 2022; 2022: 8303504. Published online 2022 Jun 7. Doi: 10.1155/2022/8303504. PMCID: PMC9197654, PMID: 35712069.
Recent Trends in Parallel Computing
Volume | 11 |
Issue | 01 |
Received | February 16, 2024 |
Accepted | March 8, 2024 |
Published | April 4, 2024 |