ANALYSIS ON PERFORMANCE SCALABILITY AVAILABILITY AND SECURITY IN VARIOUS CLOUD ENVIRONMENT SYSTEMS
Abstract
Cloud computing refers to the sharing of resources and computing tasks among a network of computers. Cloud computing enables us to do all of these things by utilising remote servers to transmit, store, and retrieve information. Because of the vast number of Virtual Machines available in the cloud, we now have the chance to perform parallel computations. The biggest threats to cloud computing may now come from its performance, scalability, availability, and security. In this article, we'll discuss the challenges of scalability, availability, and security in the context of cloud computing, and outline the steps we've taken to improve the safety and reliability of our infrastructure in this setting. Also, we stress cloud computing's elasticity. Also covered will be some of the key factors in achieving the promised high performance of cloud computing.
Downloads
References
Wani, A.R., Rana, Q.P., Pandey, N ; Performance evaluation and analysis of advanced symmetric key cryptographic algorithms for cloud computing security ;Advances in Intelligent Systems and Computing, 742, pp. 261-271, 2019 ; DOI: 10.1007/978-981-13-0589-4_24.
Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S., Sarkar, P.Cloud computing security challenges & solutions-A survey.2018 IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC, 2018-January, pp. 347-356, 2018. DOI: 10.1109/CCWC.2018.8301700.
Kaura, W.C.N., Lal, A.Survey paper on cloud computing security ;Proceedings of 2017 International Conference on Innovations in Information, Embedded and Communication Systems, ICIIECS 2017, pp. 1-6, 2018. DOI: 10.1109/ICIIECS.2017.8276134.
Shanmugasundaram, G., Aswini, V., Suganya, G.A comprehensive review on cloud computing security.Proceedings of International Conference on Innovations in Information, pp. 50-71, 2018. DOI: 10.1109/ICIIECS.2017.8275972.
Kaushik, S., Gandhi, C.Cloud computing security: Attacks, threats, risk and solutions (2018) International Journal of Networking and Virtual Organisations, 2018. DOI: 10.1504/IJNVO.2018.093926.
Mehra, N., Aggarwal, S., Shokeen, A., Bura, D. Analyzing cloud computing security issues and challenges Advances in Intelligent Systems and Computing, 710, pp. 193-202,2018. DOI: 10.1007/978-981-10-7871-2_19.
Manoj Kumar, M., Nandakumar, A.N.Exploring multilateral cloud computing security architectural design debt in terms of technical debtSmart Innovation, Systems and Technologies, 78, pp. 567-579, 2018. DOI: 10.1007/978-981-10- 5547-8_59.
Timothy, D.P., Santra, A.K. A hybrid cryptography algorithm for cloud computing security,2017 International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS2017, 2017- January, pp. 1-5, 2017. DOI: 10.1109/ICMDCS.2017.8211728.
Barona, R., Anita, E.A.M. A survey on data breach challenges in cloud computing security: Issues and threats.Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2017. DOI: 10.1109/ICCPCT.2017.8074287.
Sahil, Sood, S.K., Mehmi, S., Dogra, S.Designing and analysis of user profiling system for cloud computing security using fuzzy guided genetic algorithm.Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, art. no. 7813823, pp. 724-731, 2017. DOI: 10.1109/CCAA.2016.7813823.
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.