Academia.eduAcademia.edu

Outline

Insights on Cloud Security Management

Cloud Computing and Data Science

https://doi.org/10.37256/CCDS.4220233292

Abstract

The technology known as cloud computing makes it possible to provide computing services over the Internet. Because it allows users to access and manage information and applications through a network of remote servers, this service model has been quickly adopted due to its numerous benefits, including cost savings, scalability, and accessibility. The global market for cloud computing is expected to reach $732 billion by 2023, according to a report from International Data Corporation (IDC). A first-hand survey of approximately sixty (60) cloud companies will be used to provide an overview of cloud computing technology, its architecture, and security, privacy, and trust (SPT) concerns. Privacy concerns for users, data theft, unauthenticated access, and hacker attacks are just a few of the cloud computing problems. These perplexing security issues of validation protection, information assurance and information check are the primary impediment to cloud transformation for future turns of ...

References (22)

  1. Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, et al. NIST Cloud Computing Reference Architecture. National Institute of Standards and Technology, Gaithersburg, MD; 2011. Available from: https://doi.org/10.6028/NIST. SP.500-292.
  2. De Donno M, Tange K, Dragoni N. Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog. IEEE Access. 2019; 7: 150936-150948.
  3. Zanni A, Bellavista P, Corradi A. Integrating mobile internet of things and cloud computing towards scalability: lessons learned from existing fog computing architectures and solutions. International Journal of Cloud Computing. 2017; 6(4): 393.
  4. Rodriguez VKQ, Guillemin F. Performance analysis of resource pooling for network function virtualization. 2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks). Montreal, QC, Canada: IEEE; 2016. Available from: https://doi.org/10.1109/NETWKS.2016.7751169.
  5. Vadakkanmarveettil J. Cloud Auditor: A Brief And Easy Overview (2021). UNext; 2021. Available from: https:// u-next.com/blogs/cloud-computing/cloud-auditor/ [Accessed 18th July 2023].
  6. Gleb B, Dmitriy G. Choosing the Right Cloud Service: IaaS, PaaS, or SaaS. RubyGarage; 2019. Available from: https://rubygarage.org/blog/iaas-vs-paas-vs-saas [Accessed 18th July 2023].
  7. Ernawati T, Febiansyah F. Peer to peer (P2P) and cloud computing on infrastructure as a service (IaaS) performance analysis. Jurnal Infotel. 2022; 14(3): 161-167. Available from: https://doi.org/10.20895/infotel.v14i3.717.
  8. Bazm MM, Lacoste M, Südholt M, Menaud JM. Isolation in cloud computing infrastructures: New security challenges. Annals of Telecommunications. 2019; 74(3-4): 197-209.
  9. Taufiq-Hail GA-M, Alanzi ARA, Mohd Yusof SA, Alruwaili M. Software as a Service (SaaS) cloud computing: An empirical investigation on university students' perception. Interdisciplinary Journal of Information, Knowledge, and Management. 2021; 16: 213-253. Available from: https://doi.org/10.28945/4740.
  10. Zimba A, Chama V. Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves. International Journal of Computer Network and Information Security. 2018; 10(3): 25-36.
  11. Riad K, Hamza R, Yan H. Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access. 2019; 7: 86384-86393.
  12. Sudha MR, Sornam M. A revolutionary approach to cloud computing, security and its user compliance. Indian Journal of Science and Technology. 2017; 10(1): 1-8. Available from: https://doi.org/10.17485/ijst/2016/ v10i1/92560.
  13. Manvi SS, Shyam GK. Cloud computing: Concepts and technologies. Boca Raton, FL: CRC Press; 2021.
  14. Marks E. Seeing Through The Clouds: The Power of Cloud Transparency. Cloud Spectator; 2019. Available from: https://cloudspectator.com/the-power-of-cloud-transparency/.
  15. Khan MA, Salah K. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems. 2018; 82: 395-411.
  16. Nogueira E, Moreira A, Lucrédio D, Garcia V, Fortes R. Issues on developing interoperable cloud applications: definitions, concepts, approaches, requirements, characteristics and evaluation models. Journal of Software Engineering Research and Development. 2016; 4(1): 7. Available from: https://doi.org/10.1186/s40411-016-0033- 6.
  17. Gillham J, Abenavoli RM, Brunwasser SM, Linkins M, Reivich KJ, Seligman MEP. Resilience Education. Oxford Handbook Of Happiness; 2013. Available from: https://doi.org/10.1093/oxfordhb/.
  18. Jackson R, Drummond DK, Camara S. What is qualitative research? Qualitative Research Reports in Communication. 2007; 8(1): 21-28. Available from: https://doi.org/10.1080/17459430701617879.
  19. Busetto L, Wick W, Gumbinger C. How to use and assess qualitative research methods. Neurological Research and Practice. 2020; 2(1): 1-10. Available from: https://doi.org/10.1186/s42466-020-00059-z.
  20. Grant MJ, Sen B, Spring H. Research, evaluation and audit: Key steps in demonstrating your value. London: Facet Publishing; 2013.
  21. Charles P. Security issues in cloud computing. International Journal of Emerging Trends in Science and Technology. 2017; 5(6): 5253-5256.
  22. Drago I, Bocchi E, Mellia M, Slatman H, Pras A. Benchmarking personal cloud storage. Proceedings of the 2013 Conference on Internet Measurement Conference. ACM Digital Library; 2013. p.205-212. Available from: https:// doi.org/10.1145/2504730.2504762.