Volume 4 , Issue 1 , PP: 36 - 45, 2020 | Cite this article as | XML | Html | PDF | Full Length Article
Miss. Sayali Karmode Yelpale 1 *
Doi: https://doi.org/10.54216/JCIM.040102
Cloud computing is being transformed into a model with services. It is mainly focused on the concept of dynamic provisioning, which is applied to services as well as to the capacity, storage, networking, and information technology infrastructure. This paper reviews the key concepts of cloud computing exist. We are presenting here various concepts of cloud computing. According to the previous few surveys we are presenting various security challenges and for that what solution are overcome.
Cloud computing, Virtualization, Security, Privacy, Data protection
[1] S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud Computing (S. Pearson and G. Yee, eds.), Computer Communications and Networks,
[2] E. U. Directive, "95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals about the Processing of Personal Data and the Free Movement of such Data," Official Journal of the EC, vol. 23, 1995.
[3] “Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environment.” Retrieved June 2015.
[4] M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEX Inc.
[5] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, NIST Cloud Computing Reference Architecture: Recommendations of the National Institute of Standards and Technology (Special Publication 500-292). USA: CreateSpace Independent Publishing Platform, 2012.
[6] R. Pike, D. Presotto, K. Thompson, H. Trickey, and P. Winterbottom, "The use of namespaces in plan 9," SIGOPS Oper. Syst. Rev., vol. 27, pp. 72–76, Apr. 1993..
[7] M. A. Leandro, T. J. Nascimento, D. R. dos Santos, C. M. Westphall, and C. B. Westphall, “Multitenancy authorization system with federated identity for cloud-based environments using shibboleth,” in Proceedings of the 11th International Conference on Networks, ICN 2012, pp. 88–93, 2012.
[8] G. Dreo, M. Golling, W. Hommel, and F. Tietze, "Iceman: An architecture for secure federated intercloud identity management," in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on, pp. 1207–1210, May 2013.
[9] G. Sipos, D. Scardaci, D. Wallom, and Y. Chen, "The user support program and the training infrastructure of the EGI federated cloud," in High-Performance Computing Simulation (HPCS), 2015 International Conference on, pp. 9–18, July 2015.
[10] N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.
[11] T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP ’03, (New York, NY, USA), pp. 193–206, ACM, 2003.
[12] S. Zhu and G. Gong, “Fuzzy authorization for cloud storage,” Cloud Computing, IEEE Transactions on, vol. 2, pp. 422–435, Oct 2014.
[13] F. F. Brasser, M. Bucicoiu, and A.-R. Sadeghi, "Swap and play: Live updating hypervisors and its application to Xen," in Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, CCSW '14, (New York, NY, USA), pp. 33–44, ACM, 2014.
[14] C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arnzen, F. HernandezRodriguez, and E. Elmroth, "Improving cloud service resilience using brownout-aware load balancing," in Reliable Distributed Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31–40, Oct 2014.
[15] E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, “A synchronization mechanism for cloud accounting systems,” in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111–120, Sept 2014.
[16] Y. Huang and I. Goldberg, “Outsourced private information retrieval,” in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES ’13, (New York, NY, USA), pp. 119–130, ACM, 2013.
[17] M. Gostev, J. Fernandez-Banet, J. Rung, J. Dietrich, I. Prokopenko, S. Ripatti, M. I. McCarthy, A. Brazma, and M. Krestyaninova, "SAIL - a software system for sample and phenotype availability across biobanks and cohorts," Bioinformatics, vol. 27, no. 4, pp. 589591, 2011.
[18] A. Gholami, E. Laure, P. Somogyi, O. Spjuth, S. Niazi, and J. Dowling, “Privacy-preservation for publishing sample availability data with personal identifiers,” Journal of Medical and Bioengineering, vol. 4, pp. 117–125, April 2014.
[19] L. Zhou, V. Varadharajan, and M. Hitchens, “Integrating trust with cryptographic role-based access control for secure cloud data storage,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 560–569, July 2013.
[20] J. Sendor, Y. Lehmann, G. Serme, and A. Santana de Oliveira, "Platform level support for authorization in cloud services with OAuth 2," in Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E '14, (Washington, DC, USA), pp. 458–465, IEEE Computer Society, 2014.
[21] C. Klein, A. Papadopoulos, M. Dellkrantz, J. Durango, M. Maggio, K.-E. Arnzen, F. HernandezRodriguez, and E. Elmroth, "Improving cloud service resilience using brownout-aware load balancing," in Reliable Distributed Systems (SRDS), 2014 IEEE 33rd International Symposium on, pp. 31–40, Oct 2014.
[22] E. Lakew, L. Xu, F. Hernandez-Rodriguez, E. Elmroth, and C. Pahl, “A synchronization mechanism for cloud accounting systems,” in Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, pp. 111–120, Sept 2014.