ANALYSIS ON PERFORMANCE SCALABILITY AVAILABILITY AND SECURITY IN VARIOUS CLOUD ENVIRONMENT SYSTEMS

Authors

  • ATHMAKURI NAVEEN KUMAR

Abstract

Cloud computing refers to the sharing of resources and computing tasks among a network of computers. Cloud computing enables us to do all of these things by utilising remote servers to transmit, store, and retrieve information. Because of the vast number of Virtual Machines available in the cloud, we now have the chance to perform parallel computations. The biggest threats to cloud computing may now come from its performance, scalability, availability, and security. In this article, we'll discuss the challenges of scalability, availability, and security in the context of cloud computing, and outline the steps we've taken to improve the safety and reliability of our infrastructure in this setting. Also, we stress cloud computing's elasticity. Also covered will be some of the key factors in achieving the promised high performance of cloud computing.

Downloads

Download data is not yet available.

References

Wani, A.R., Rana, Q.P., Pandey, N ; Performance evaluation and analysis of advanced symmetric key cryptographic algorithms for cloud computing security ;Advances in Intelligent Systems and Computing, 742, pp. 261-271, 2019 ; DOI: 10.1007/978-981-13-0589-4_24.

Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S., Sarkar, P.Cloud computing security challenges & solutions-A survey.2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC, 2018-January, pp. 347-356, 2018. DOI: 10.1109/CCWC.2018.8301700.

Kaura, W.C.N., Lal, A.Survey paper on cloud computing security ;Proceedings of 2017 International Conference on Innovations in Information, Embedded and Communication Systems, ICIIECS 2017, pp. 1-6, 2018. DOI: 10.1109/ICIIECS.2017.8276134.

Shanmugasundaram, G., Aswini, V., Suganya, G.A comprehensive review on cloud computing security.Proceedings of International Conference on Innovations in Information, pp. 50-71, 2018. DOI: 10.1109/ICIIECS.2017.8275972.

Kaushik, S., Gandhi, C.Cloud computing security: Attacks, threats, risk and solutions (2018) International Journal of Networking and Virtual Organisations, 2018. DOI: 10.1504/IJNVO.2018.093926.

Mehra, N., Aggarwal, S., Shokeen, A., Bura, D. Analyzing cloud computing security issues and challenges Advances in Intelligent Systems and Computing, 710, pp. 193-202,2018. DOI: 10.1007/978-981-10-7871-2_19.

Manoj Kumar, M., Nandakumar, A.N.Exploring multilateral cloud computing security architectural design debt in terms of technical debtSmart Innovation, Systems and Technologies, 78, pp. 567-579, 2018. DOI: 10.1007/978-981-10- 5547-8_59.

Timothy, D.P., Santra, A.K. A hybrid cryptography algorithm for cloud computing security,2017 International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS2017, 2017- January, pp. 1-5, 2017. DOI: 10.1109/ICMDCS.2017.8211728.

Barona, R., Anita, E.A.M. A survey on data breach challenges in cloud computing security: Issues and threats.Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017. DOI: 10.1109/ICCPCT.2017.8074287.

Sahil, Sood, S.K., Mehmi, S., Dogra, S.Designing and analysis of user profiling system for cloud computing security using fuzzy guided genetic algorithm.Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, art. no. 7813823, pp. 724-731, 2017. DOI: 10.1109/CCAA.2016.7813823.

Downloads

Published

2021-02-28

How to Cite

KUMAR, A. N. . (2021). ANALYSIS ON PERFORMANCE SCALABILITY AVAILABILITY AND SECURITY IN VARIOUS CLOUD ENVIRONMENT SYSTEMS. The Journal of Contemporary Issues in Business and Government, 27(1), 4583–4591. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/887