SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 881
Understanding the Determinants of Security and
Privacy in Cloud Computing Architecture
Yin Myo Kay Khine Thaw, Khin Myat Nwe Win
Lecturer, Information Technology Supporting and Maintenance Department,
University of Computer Studies, Mandalay, Myanmar
How to cite this paper: Yin Myo Kay
Khine Thaw | Khin Myat Nwe Win
"Understanding the Determinants of
Security and Privacy in Cloud Computing
Architecture"
Published in
InternationalJournal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August 2019, pp.881-884,
https://doi.org/10.31142/ijtsrd26452
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Cloud computing is an emerging model of business computing. Cloud
computing is a service, which offers customers to work over the internet. It
simply states that cloud computing means storing and accessing the data and
programs over the internet rather than the computer’sharddisk. Thedatacan
be anything such as music, files, images, documents, and many more. Theuser
can access the data from anywhere just with the help of an internet
connection. To access cloud computing, the user should register and provide
with ID and password for security reasons. The speed of transfer depends on
various factors such as internet speed, the capacity of the server, and many
more. In this paper, we explore theunderstandingthedeterminatesof security
and privacy in cloud computing, Cloud Computing architecture and We also
address the characteristics and applications of several popular cloud
computing platforms. We identified several challenges from the cloud
computing adoption perspective and we also highlighted the cloud
interoperability issue that deserves substantial further research and
development. However, security and privacy issues present a strong barrier
for users to adapt to cloud computing systems.
KEYWORDS: Cloud computing, architecture, challenges, cloud platforms
I. INTRODUCTION
Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources thatcanberapidly
provisioned and released with minimal management effort or service provider
interaction [4].
Cloud computing has emerged as a popular solution to
provide cheap and easy access to externalized IT
(Information Technology) resources. An increasing number
of organizations (e.g., research centers, enterprises) benefit
from Cloud computing to host their applications. Through
virtualization, Cloud computing is able to address with the
same physical infrastructure a large client base with
different computational needs [5], [6]. In contrast to
previous paradigms (Clusters and Grid computing), Cloud
computing is not application-oriented but service-oriented;
it offers on-demand virtualizedresourcesasmeasurableand
billable utilities [7], [8]. Cloud computing is becoming an
increasingly popular enterprise model in which computing
resources are made available on-demand to the user as
needed. The unique value proposition of cloud computing
creates new opportunities to align IT and business Cloud
Computing is a versatile technologythatcansupportabroad
spectrum of applications. The low cost of cloud computing
and its dynamic scaling renders it an innovation driver for
small companies, particularly inthedevelopingworld. Cloud
deployed enterprise resource planning (ERP), supply chain
management applications (SCM), customer relationship
management (CRM) applications, medical applications and
mobile applications have the potential to reach millions of
users. In this paper, we explore the different concepts
involved in cloud computing. Leveraging our experiences on
various clouds, we examine clouds from technical, and
service aspects. We highlight some of the opportunities in
cloud computing, underlining the importance of clouds and
showing why that technology must succeed. Finally, we
discuss some of the issues that this area should deal with.
II. CLOUD COMPUTING ARCHITECTURAL
Cloud Computing architecturebasically comprisesof thetwo
parts. They are the front-end and the back-end. The front
end is the end which uses by the user and the back-end
manages by the host. Both the end connects to each other
with the means of the internet.
A. Front End
The front end is the client part of Cloud Computing which
uses as per the requirement of theuser. Front-end comprises
of the applications and the interfaces which help to access
cloud computing. Example- Browseroranappcreatedbythe
company itself.
B. Back End
The back end is a part which manages by the allotted
authorities of the company and their back end has largedata
storage facilities, Virtual machines, security system, and
servers. They are also engaged in traffic management along
with security management.
III. COMPONENTS ON CLOUD COMPUTING
ARCHITECTURE
Components of Cloud Computing Architecture - One of the
advantages of cloud computing is the automation of the
IJTSRD26452
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 882
various management tasks, and there is human intervention
in it. Peoples are in charge of Developerusers whileenjoying
and using a cloud computing system. To be a successful
cloud computing implementation, required some
components. Without these elements, cloud computing will
be involved. These components are implemented by many
people with few skills, experience, and theirbackgroundsare
different. In cloud computing, hardware must not be
physically adjacent to the developer's office or the data
center. In fact, the infrastructure for cloud computing can be
placed anywhere, even to a foreign country, though. Thus be
allocated to the cost of electricity and the price of the land
was cheap.
Fig (1) Components of Cloud Computing Architecture
A. Hypervisor
The hypervisor is also known as Virtual Machine Monitor.
This consists of the software, hardware,and firmwarewhich
makes and runs the virtual machines. The Hypervisor
provides a user with a platform which is known as Virtual
Operating Platform. This allows us to manage the guest’s
operating system to use the cloud. This can be alsoknownas
the traditional term of the kernel in an operating system.
B. Management Software
Management software consists of various plans and the
strategies which help to increase the performance of the
cloud. This management software provides many features
such as on-time delivery of storage, proper security, all-time
access, and many other facilities. This is oneof theimportant
parts of Cloud Computing architecture. One of theimportant
features of this is the compliance auditing, management of
overseeing disaster, and contingency plans.
C. Deployment Software
Cloud deployment simply means to initiate the working of
the SaaS, PaaS, and IaaS. This initiates the solutions that can
access by the users or the customers. This deployment
consists of all themandatory installationsand configurations
of the cloud. This emerges from the back end and
implements before the provisioning occurs.
D. Route of Connectivity
It is an important part of the Cloud Computing architecture,
through which the whole cloud gets connected. Thespeed of
transfer depends on the network which is the internet
connection. There are many cloud servers present which
connects with the help of this virtual route. This also
provides a facility to the user by allowing them to customize
the route and protocol.
E. A server of the Cloud
the cloud server is a virtual server running in cloud
computing premises. It’s engineered, hosted and delivered
via a cloud computing platform via the web. It can be
accessed from anywhere. Cloud serversarestable,quickand
secured. They avoid the hardware problems seen with
physical servers, and that they are seemingly to be the
foremost stable choice for businesses. Also, call as virtual
servers. Cloud servers have all the software theyneed torun
and can operate as non-dependent units. It also has the
profit because it is incredibly simple and fast to upgrade by
adding memory and disk space, further as being more cost-
effective.
F. Storage of the Cloud
Cloud storage service, construct to produce applications,
services and organizations with access to offsite storage
capability that may provision instantly are versatile in
scaling automatically at runtime and is globally accessible.
An Infrastructure as a Service (IaaS) service model delivers
scalable, flexible and redundant storage capability through
net services API, online interfaces and thin client
applications. Cloud Storage also benefits the user by
providing remote access with the help of internet. The
storage services are very quick to access. Cloud information
is often held on, altered and retrieved from a remote cloud
storage server over the web below a utility computing
model.[8]
IV. CLOUD DELIVERY MODELS
This section of the paper describes the various cloud
delivery models. Cloud can be delivered in 3 models namely
SaaS, PaaS, and IaaS. On the basis of the services cloudoffers,
we can count on the following cloud delivery models:
1. Software as a Service (SaaS)
Software as a Service (SaaS): In this model, a complete
application is offered to the customer, as a service on
demand. A single instance of the service runs on the cloud &
multiple end users are serviced. On the customers‟ side,
there is no need for upfront investment in servers or
software licenses, while for the provider, the costs are
lowered, since only a single application needs tobehosted &
maintained. Today SaaS is offered by companies such as
Google, Salesforce, Microsoft,Zoho, etcItisthetopmostlayer
of the cloud. The end-users experience the applications on-
demand over the internet. The cloud gives access to many
applications for development, deployment, and performing
other useful tasks like working on excel, word online, Email,
ERP tools, etc. In a cloud-computing environment. SaaS is
software that is owned, delivered and managed remotely by
one or more providers and that is offered in a pay-per-use
manner [9]. SaaS in simple termscanbedefinedas“Software
deployed as a hosted service andaccessed overtheInternet.”
[10]. SaaS clouds provide scalability and also shifts
significant burdens from subscribers to providers, resulting
in a number of opportunities for greater efficiency and, in
some cases, performance. The typical user of a SaaS offering
usually has neither knowledge nor control about the
underlying infrastructure [11].
2. Network as a Service (NaaS)
Cloud offers you to configure, manage and develop
networking environment for your application.Here, you can
deploy your application intheVirtualprivateorpubliccloud.
You can set your subnet groups, perform masking, generate
static IP, manage domain namesystem,andadd toor remove
security groups for all networking layers you need like
HTTP, HTTPs, FTP, sFTP, etc.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 883
3. Platform as a Service (PaaS)
Cloud provides a platform for writing, configuring, and
deploying your code directly. You don’t have to worry about
the machine. Cloud will automatically manage your device,
no matter which language, for example, node.js, PHP or
Python your code is written. You have to select therightone,
for example, AWS provides light sail service that you can
deploy to host your website in any language. This kind of
cloud computing provides a development environment as a
service. The consumer can use the middleman’s equipment
to develop his own program and deliver it to the users
through the Internet and servers. Theconsumer controls the
applications that run in the environment but does not
control the operating system, hardware or network
infrastructure on which they are running. Platform as a
Service (Paas): Here, a layer of software or development
environment is encapsulated & offered as a service, upon
which other higher levels of service can be built. The
customer has the freedom to build his own applications,
which run on the provider‟s infrastructure. To meet
manageability and scalability requirements of the
applications, PaaS providers offer a predefined combination
of OS and application servers, such asLAMPplatform(Linux,
Apache, MySql and PHP), restricted J2EE, Ruby etc. Google‟s
App Engine, Force.com, etc are some of the popular PaaS
examples
4. Infrastructure as a Service (IaaS)
The most advanced featurecloudoffersIaaSwhich facilitates
to use machine resources in the cloud. You can configure
your machine according to your need from the vast
marketplace. You can select machine image type from
Ubuntu, Amazon, Microsoft etc., and can add CPU in batch or
parallel for fulfilling your utilization, choose solid-state
device memory(SSD) or HDD based on your data input-
output speed and so on. So always go for the right one
because this architecture would be the efficiency pillar of
your organization. Infrastructure as a Service (Iaas): IaaS
provides basic storage and computing capabilities as
standardized services over the network. Servers, storage
systems, networking equipment, data center space, etc. are
pooled and made available to handle workloads. The
customer would typically deploy his own software on the
infrastructure.Some commonexamples areAmazon,GoGrid,
3 Tera, etc.
5. Storage as a Service
Cloud offers storage service to your application. Anyone can
buy from a small figure of 5GB to terabytes of storage on the
cloud from service providers. It will also provide the type of
storage you want to buy like a disk, SSD, IOPS SSD, and HDD.
6. Testing as a Service
A lot of software, infrastructure, and other testing tools are
now available in the cloud to use like Blazemeter,
LoadStorm, Jenkins Dev, etc.
V. SECURITY AND PRIVACY IN CLOUD COMPUTING
Recent advances have given rise to the popularity and
success of cloud computing. However, whenoutsourcingthe
data and business application to a third party causes the
security and privacy issues to become a critical concern in
Security and Privacy in Cloud Computing. Cloud computing
becomes a successful and popular business model due to its
charming features. In addition to the benefits at hand, the
former features also result in serious cloud-specific security
issues. The people whose concern is the cloud security
continue to hesitate to transfer their business to cloud.
Security issues have been the dominate barrier of the
development and widespread use of cloud computing.There
are three main challenges for building a secure and
trustworthy cloud system:
Outsourcing
Outsourcing brings down both capital expenditure (CapEx)
and operational expenditure for cloud customers. However,
outsourcing also means that customers physically lose
control of their data and tasks. The loss of control problem
has become one of the root causes of cloud insecurity. To
address outsourcing security issues, first, thecloudprovider
shall be trustworthy by providing trust and secure
computing and data storage; second, outsourced data and
computation shall be verifiable to customers in terms of
confidentiality, integrity, and other security services. In
addition, outsourcing will potentially incur privacy
violations, due to the fact that sensitive/classifieddatais out
of the owners’ control.
Multi-tenancy
Multi-tenancy means that the cloud platform is shared and
utilized by multiple customers. Moreover, in a virtualized
environment, data belonging to different customers may be
placed on the same physical machine by certain resource
allocation policy. Adversaries who may also be legitimate
cloud customers may exploit the co-residence issue. Aseries
of security issues such as data breach [10], computation
breach, flooding attack, etc., are incurred. Although Multi-
tenancy is a definite choice of cloud vendors due to its
economic efficiency, it provides new vulnerabilities to the
cloud platform. Without changing the multi-tenancy
paradigm, it is imperative to design new security
mechanisms to deal with the potential risks.
Massive data and intense computation –
Cloud computing is capable of handling mass data storage
and intense computing tasks. Therefore, traditional security
mechanisms may not suffice due to unbearable computation
or communication overhead. For example, to verify the
integrity of data that is remotely stored, it is impractical to
hash the entire data set. To this end, new strategies and
protocols are expected.
VI. CONCLUSIONS
Cloud Computing is an emerging technology which is
skyrocketing nowadays. This technology is oftenused bybig
companies as well as the startups as it is flexible for both.
Every company is in need to store the data so they require
cloud to store their information. The data is secured and can
access anytime and from anywhere. Cloud computing is a
computing paradigm, where a large pool of systems is
connected in private or public networks, to provide
dynamically scalable infrastructure for application,dataand
file storage. With the advent of this technology, the cost of
computation, application hosting, content storage and
delivery is reduced significantly. Cloud computing is a
practical approach to experience direct cost benefits and it
has the potential to transform a data center from a capital-
intensive set up to a variable priced environment. The idea
of cloud computing is based on a very fundamentalprinciple
of „reusability of IT capabilities'. The difference that cloud
computing brings compared to traditional concepts of “grid
computing”, “distributed computing”, “utilitycomputing”,or
“autonomic computing” is to broaden horizons across
organizational boundaries.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 884
REFERENCES
[1] M. Q. Zhou, R. Zhang, W. Xie, W. N. Qian, and A. Zhou,
“Security and Privacy in Cloud Computing: A Survey,”
2010 Sixth International Conference on Semantics,
Knowledge and Grids(SKG), pp.105-112,DOI= 1-3 Nov.
2010.
[2] J. F. Yang and Z. B. Chen, “Cloud Computing Research
and Security Issues,” 2010 IEEE International
Conference on Computational Intelligence and
Software Engineering (CISE), Wuhan pp. 1-3, DOI= 10-
12 Dec. 2010.
[3] Santosh Kumar and R. H. Goudar, Cloud Computing –
Research Issues, Challenges, Architecture, Platforms
and Applications: A Survey, International Journal of
Future Computer and Communication, Vol. 1, No. 4,
December 2012.
[4] "NIST Cloud Computing Definition", NIST SP 800-145]
[5] R. Aoun, E. A. Doumith, and M. Gagnaire, “Resource
provisioning for enriched services in Cloud
environment,” in Proc. IEEE CloudCom Conf., 2010, pp.
296 – 303.
[6] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented
Cloud computing: Vision, hype, and reality for
delivering IT services as computing utilities,” inProc.
IEEE/ACM Grid Conf., 2008, pp. 50–57.
[7] R. Aoun and M. Gagnaire, “Towards a fairer benefit
distribution in Grid environments,” inProc. IEEE/ACS
AICCSA Conf., 2009,pp. 21– 26
[8] https://data-flair.training/blogs/cloud-computing-
architecture/
[9] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest
Insight: SaaS Demand Set to Outpace Enterprise
Application Software Market.
[10] N. Santos, K.P. Gummadi, and R. Rodrigues, “Towards
trusted cloud computing,” Proc. 2009 conference on
Hot topics in cloud computing, 2009
[11] Growth. Gartner RAS Core Research Note, 3 August
2007 Moxie Marlinspike,"NewTricksfor DefeatingSSL
In Practice," 2009.
[12] Frederick Chong and Gianpaolo Carraro, "Architecture
Strategies for Catching the Long Tail," Microsoft
Corporation, April 2006.

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computingSandhya Rathi
 
Toward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security PerspectiveToward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security Perspectiveijtsrd
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technologyeSAT Publishing House
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectMohamed Shorbagy
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing reportANKIT KUMAR
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Seungyun Lee
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 

Was ist angesagt? (19)

Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Toward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security PerspectiveToward Cloud Network Infrastructure Approach Service and Security Perspective
Toward Cloud Network Infrastructure Approach Service and Security Perspective
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
D32035052
D32035052D32035052
D32035052
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Reminiscing cloud computing technology
Reminiscing cloud computing technologyReminiscing cloud computing technology
Reminiscing cloud computing technology
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 

Ähnlich wie Understanding the Determinants of Security and Privacy in Cloud Computing Architecture

Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPChirantan Ghosh
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 

Ähnlich wie Understanding the Determinants of Security and Privacy in Cloud Computing Architecture (20)

Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENTA REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
G0314043
G0314043G0314043
G0314043
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Understanding the Determinants of Security and Privacy in Cloud Computing Architecture

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 881 Understanding the Determinants of Security and Privacy in Cloud Computing Architecture Yin Myo Kay Khine Thaw, Khin Myat Nwe Win Lecturer, Information Technology Supporting and Maintenance Department, University of Computer Studies, Mandalay, Myanmar How to cite this paper: Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in InternationalJournal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.881-884, https://doi.org/10.31142/ijtsrd26452 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’sharddisk. Thedatacan be anything such as music, files, images, documents, and many more. Theuser can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore theunderstandingthedeterminatesof security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. KEYWORDS: Cloud computing, architecture, challenges, cloud platforms I. INTRODUCTION Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources thatcanberapidly provisioned and released with minimal management effort or service provider interaction [4]. Cloud computing has emerged as a popular solution to provide cheap and easy access to externalized IT (Information Technology) resources. An increasing number of organizations (e.g., research centers, enterprises) benefit from Cloud computing to host their applications. Through virtualization, Cloud computing is able to address with the same physical infrastructure a large client base with different computational needs [5], [6]. In contrast to previous paradigms (Clusters and Grid computing), Cloud computing is not application-oriented but service-oriented; it offers on-demand virtualizedresourcesasmeasurableand billable utilities [7], [8]. Cloud computing is becoming an increasingly popular enterprise model in which computing resources are made available on-demand to the user as needed. The unique value proposition of cloud computing creates new opportunities to align IT and business Cloud Computing is a versatile technologythatcansupportabroad spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly inthedevelopingworld. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have the potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. II. CLOUD COMPUTING ARCHITECTURAL Cloud Computing architecturebasically comprisesof thetwo parts. They are the front-end and the back-end. The front end is the end which uses by the user and the back-end manages by the host. Both the end connects to each other with the means of the internet. A. Front End The front end is the client part of Cloud Computing which uses as per the requirement of theuser. Front-end comprises of the applications and the interfaces which help to access cloud computing. Example- Browseroranappcreatedbythe company itself. B. Back End The back end is a part which manages by the allotted authorities of the company and their back end has largedata storage facilities, Virtual machines, security system, and servers. They are also engaged in traffic management along with security management. III. COMPONENTS ON CLOUD COMPUTING ARCHITECTURE Components of Cloud Computing Architecture - One of the advantages of cloud computing is the automation of the IJTSRD26452
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 882 various management tasks, and there is human intervention in it. Peoples are in charge of Developerusers whileenjoying and using a cloud computing system. To be a successful cloud computing implementation, required some components. Without these elements, cloud computing will be involved. These components are implemented by many people with few skills, experience, and theirbackgroundsare different. In cloud computing, hardware must not be physically adjacent to the developer's office or the data center. In fact, the infrastructure for cloud computing can be placed anywhere, even to a foreign country, though. Thus be allocated to the cost of electricity and the price of the land was cheap. Fig (1) Components of Cloud Computing Architecture A. Hypervisor The hypervisor is also known as Virtual Machine Monitor. This consists of the software, hardware,and firmwarewhich makes and runs the virtual machines. The Hypervisor provides a user with a platform which is known as Virtual Operating Platform. This allows us to manage the guest’s operating system to use the cloud. This can be alsoknownas the traditional term of the kernel in an operating system. B. Management Software Management software consists of various plans and the strategies which help to increase the performance of the cloud. This management software provides many features such as on-time delivery of storage, proper security, all-time access, and many other facilities. This is oneof theimportant parts of Cloud Computing architecture. One of theimportant features of this is the compliance auditing, management of overseeing disaster, and contingency plans. C. Deployment Software Cloud deployment simply means to initiate the working of the SaaS, PaaS, and IaaS. This initiates the solutions that can access by the users or the customers. This deployment consists of all themandatory installationsand configurations of the cloud. This emerges from the back end and implements before the provisioning occurs. D. Route of Connectivity It is an important part of the Cloud Computing architecture, through which the whole cloud gets connected. Thespeed of transfer depends on the network which is the internet connection. There are many cloud servers present which connects with the help of this virtual route. This also provides a facility to the user by allowing them to customize the route and protocol. E. A server of the Cloud the cloud server is a virtual server running in cloud computing premises. It’s engineered, hosted and delivered via a cloud computing platform via the web. It can be accessed from anywhere. Cloud serversarestable,quickand secured. They avoid the hardware problems seen with physical servers, and that they are seemingly to be the foremost stable choice for businesses. Also, call as virtual servers. Cloud servers have all the software theyneed torun and can operate as non-dependent units. It also has the profit because it is incredibly simple and fast to upgrade by adding memory and disk space, further as being more cost- effective. F. Storage of the Cloud Cloud storage service, construct to produce applications, services and organizations with access to offsite storage capability that may provision instantly are versatile in scaling automatically at runtime and is globally accessible. An Infrastructure as a Service (IaaS) service model delivers scalable, flexible and redundant storage capability through net services API, online interfaces and thin client applications. Cloud Storage also benefits the user by providing remote access with the help of internet. The storage services are very quick to access. Cloud information is often held on, altered and retrieved from a remote cloud storage server over the web below a utility computing model.[8] IV. CLOUD DELIVERY MODELS This section of the paper describes the various cloud delivery models. Cloud can be delivered in 3 models namely SaaS, PaaS, and IaaS. On the basis of the services cloudoffers, we can count on the following cloud delivery models: 1. Software as a Service (SaaS) Software as a Service (SaaS): In this model, a complete application is offered to the customer, as a service on demand. A single instance of the service runs on the cloud & multiple end users are serviced. On the customers‟ side, there is no need for upfront investment in servers or software licenses, while for the provider, the costs are lowered, since only a single application needs tobehosted & maintained. Today SaaS is offered by companies such as Google, Salesforce, Microsoft,Zoho, etcItisthetopmostlayer of the cloud. The end-users experience the applications on- demand over the internet. The cloud gives access to many applications for development, deployment, and performing other useful tasks like working on excel, word online, Email, ERP tools, etc. In a cloud-computing environment. SaaS is software that is owned, delivered and managed remotely by one or more providers and that is offered in a pay-per-use manner [9]. SaaS in simple termscanbedefinedas“Software deployed as a hosted service andaccessed overtheInternet.” [10]. SaaS clouds provide scalability and also shifts significant burdens from subscribers to providers, resulting in a number of opportunities for greater efficiency and, in some cases, performance. The typical user of a SaaS offering usually has neither knowledge nor control about the underlying infrastructure [11]. 2. Network as a Service (NaaS) Cloud offers you to configure, manage and develop networking environment for your application.Here, you can deploy your application intheVirtualprivateorpubliccloud. You can set your subnet groups, perform masking, generate static IP, manage domain namesystem,andadd toor remove security groups for all networking layers you need like HTTP, HTTPs, FTP, sFTP, etc.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 883 3. Platform as a Service (PaaS) Cloud provides a platform for writing, configuring, and deploying your code directly. You don’t have to worry about the machine. Cloud will automatically manage your device, no matter which language, for example, node.js, PHP or Python your code is written. You have to select therightone, for example, AWS provides light sail service that you can deploy to host your website in any language. This kind of cloud computing provides a development environment as a service. The consumer can use the middleman’s equipment to develop his own program and deliver it to the users through the Internet and servers. Theconsumer controls the applications that run in the environment but does not control the operating system, hardware or network infrastructure on which they are running. Platform as a Service (Paas): Here, a layer of software or development environment is encapsulated & offered as a service, upon which other higher levels of service can be built. The customer has the freedom to build his own applications, which run on the provider‟s infrastructure. To meet manageability and scalability requirements of the applications, PaaS providers offer a predefined combination of OS and application servers, such asLAMPplatform(Linux, Apache, MySql and PHP), restricted J2EE, Ruby etc. Google‟s App Engine, Force.com, etc are some of the popular PaaS examples 4. Infrastructure as a Service (IaaS) The most advanced featurecloudoffersIaaSwhich facilitates to use machine resources in the cloud. You can configure your machine according to your need from the vast marketplace. You can select machine image type from Ubuntu, Amazon, Microsoft etc., and can add CPU in batch or parallel for fulfilling your utilization, choose solid-state device memory(SSD) or HDD based on your data input- output speed and so on. So always go for the right one because this architecture would be the efficiency pillar of your organization. Infrastructure as a Service (Iaas): IaaS provides basic storage and computing capabilities as standardized services over the network. Servers, storage systems, networking equipment, data center space, etc. are pooled and made available to handle workloads. The customer would typically deploy his own software on the infrastructure.Some commonexamples areAmazon,GoGrid, 3 Tera, etc. 5. Storage as a Service Cloud offers storage service to your application. Anyone can buy from a small figure of 5GB to terabytes of storage on the cloud from service providers. It will also provide the type of storage you want to buy like a disk, SSD, IOPS SSD, and HDD. 6. Testing as a Service A lot of software, infrastructure, and other testing tools are now available in the cloud to use like Blazemeter, LoadStorm, Jenkins Dev, etc. V. SECURITY AND PRIVACY IN CLOUD COMPUTING Recent advances have given rise to the popularity and success of cloud computing. However, whenoutsourcingthe data and business application to a third party causes the security and privacy issues to become a critical concern in Security and Privacy in Cloud Computing. Cloud computing becomes a successful and popular business model due to its charming features. In addition to the benefits at hand, the former features also result in serious cloud-specific security issues. The people whose concern is the cloud security continue to hesitate to transfer their business to cloud. Security issues have been the dominate barrier of the development and widespread use of cloud computing.There are three main challenges for building a secure and trustworthy cloud system: Outsourcing Outsourcing brings down both capital expenditure (CapEx) and operational expenditure for cloud customers. However, outsourcing also means that customers physically lose control of their data and tasks. The loss of control problem has become one of the root causes of cloud insecurity. To address outsourcing security issues, first, thecloudprovider shall be trustworthy by providing trust and secure computing and data storage; second, outsourced data and computation shall be verifiable to customers in terms of confidentiality, integrity, and other security services. In addition, outsourcing will potentially incur privacy violations, due to the fact that sensitive/classifieddatais out of the owners’ control. Multi-tenancy Multi-tenancy means that the cloud platform is shared and utilized by multiple customers. Moreover, in a virtualized environment, data belonging to different customers may be placed on the same physical machine by certain resource allocation policy. Adversaries who may also be legitimate cloud customers may exploit the co-residence issue. Aseries of security issues such as data breach [10], computation breach, flooding attack, etc., are incurred. Although Multi- tenancy is a definite choice of cloud vendors due to its economic efficiency, it provides new vulnerabilities to the cloud platform. Without changing the multi-tenancy paradigm, it is imperative to design new security mechanisms to deal with the potential risks. Massive data and intense computation – Cloud computing is capable of handling mass data storage and intense computing tasks. Therefore, traditional security mechanisms may not suffice due to unbearable computation or communication overhead. For example, to verify the integrity of data that is remotely stored, it is impractical to hash the entire data set. To this end, new strategies and protocols are expected. VI. CONCLUSIONS Cloud Computing is an emerging technology which is skyrocketing nowadays. This technology is oftenused bybig companies as well as the startups as it is flexible for both. Every company is in need to store the data so they require cloud to store their information. The data is secured and can access anytime and from anywhere. Cloud computing is a computing paradigm, where a large pool of systems is connected in private or public networks, to provide dynamically scalable infrastructure for application,dataand file storage. With the advent of this technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. Cloud computing is a practical approach to experience direct cost benefits and it has the potential to transform a data center from a capital- intensive set up to a variable priced environment. The idea of cloud computing is based on a very fundamentalprinciple of „reusability of IT capabilities'. The difference that cloud computing brings compared to traditional concepts of “grid computing”, “distributed computing”, “utilitycomputing”,or “autonomic computing” is to broaden horizons across organizational boundaries.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26452 | Volume – 3 | Issue – 5 | July - August 2019 Page 884 REFERENCES [1] M. Q. Zhou, R. Zhang, W. Xie, W. N. Qian, and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” 2010 Sixth International Conference on Semantics, Knowledge and Grids(SKG), pp.105-112,DOI= 1-3 Nov. 2010. [2] J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” 2010 IEEE International Conference on Computational Intelligence and Software Engineering (CISE), Wuhan pp. 1-3, DOI= 10- 12 Dec. 2010. [3] Santosh Kumar and R. H. Goudar, Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey, International Journal of Future Computer and Communication, Vol. 1, No. 4, December 2012. [4] "NIST Cloud Computing Definition", NIST SP 800-145] [5] R. Aoun, E. A. Doumith, and M. Gagnaire, “Resource provisioning for enriched services in Cloud environment,” in Proc. IEEE CloudCom Conf., 2010, pp. 296 – 303. [6] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented Cloud computing: Vision, hype, and reality for delivering IT services as computing utilities,” inProc. IEEE/ACM Grid Conf., 2008, pp. 50–57. [7] R. Aoun and M. Gagnaire, “Towards a fairer benefit distribution in Grid environments,” inProc. IEEE/ACS AICCSA Conf., 2009,pp. 21– 26 [8] https://data-flair.training/blogs/cloud-computing- architecture/ [9] Mertz SA, Eschinger C, Eid T, Pring B (2007) Dataquest Insight: SaaS Demand Set to Outpace Enterprise Application Software Market. [10] N. Santos, K.P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” Proc. 2009 conference on Hot topics in cloud computing, 2009 [11] Growth. Gartner RAS Core Research Note, 3 August 2007 Moxie Marlinspike,"NewTricksfor DefeatingSSL In Practice," 2009. [12] Frederick Chong and Gianpaolo Carraro, "Architecture Strategies for Catching the Long Tail," Microsoft Corporation, April 2006.