CLOUD SECURITY: A REVIEW OF CURRENT ISSUES AND PROPOSED SOLUTIONS
- Hits: 379
Volume 5 (1), June 2022, Pages 52-56
Cloud technologies are currently one of the fastest growing directions in the IT field. This architecture uses virtualization technology in several computing paradigms (distributed systems, grid and service computing, etc.). It is possible to reach the goal using the unlimited possibilities of the Internet. It should be noted that most companies have transferred their resources and capabilities to cloud technology. According to Check Point Software Technologies Ltd 2020 statistics, 39% of enterprises said that security is important in cloud technology, and 52% said that public and hybrid cloud technologies have become more critical in the direction of security over the past two years. Enterprises are concerned about personal data storage and using special software enabled by cloud technologies. They are considering these points. This paper also discusses the various benefits of the cloud with its challenges and applications
Cloud Technologies, Paas, Saas, Iaas, DraaS, Baas.
Diaby, T., & Rad, B. B. (2017). Cloud computing: a review of the concepts and deployment models. International Journal of Information Technology and Computer Science, 9(6), 50-58.
Indu, I., Anand, P. R., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering science and technology, an international journal, 21(4), 574-588.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In 2012 international conference on computing, electronics and electrical technologies (ICCEET) (pp. 877-880). IEEE.
Kamara, S., & Lauter, K. (2010). Cryptographic Cloud Storage, Microsoft Research.
Kaur, R. (2015). A review of computing technologies: distributed, utility, cluster, grid and cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 5(2), 144-148.
Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers, 3(1), 1-35.
Khan, S. I., & Hoque, A. S. L. (2016, January). Privacy and security problems of national health data warehouse: a convenient solution for developing countries. In 2016 International Conference on Networking Systems and Security (NSysS) (pp. 1-6). IEEE.
Mohit, P., & Biswas, G. P. (2017). Confidentiality and storage of data in cloud environment. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications (pp. 289-295). Springer, Singapore.
Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268.
Shaikh, F. B., & Haider, S. (2011, December). Security threats in cloud computing. In 2011 International conference for Internet technology and secured transactions (pp. 214-219). IEEE.
Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28-42.
Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), 75-86.