مقال اكاديمي في الحوسبة السحابية

مقال اكاديمي في الحوسبة السحابية

    RESEARCH ON KEY SECURITY STRATEGIES OF CLOUD COMPUTING

BY

                     Saif Al-din M. Najim         Shokhan M. Al-Barzinji 

  

The platform of Cloud computing is model based on Internet environment which enables an easy on-demand access and usage payment of each access and utilization of pool of networks that is shared among multiple users. This type of computing is considered as another innovation that fulfils users’ needs and requirements for resources of computing like stockpiling, systems, administrations and applications as well as servers. Securing the cloud’s stored Data is seen as one of the significant principles with many challenges and concerns in the research of cloud computing. This study has reviewed the research in a critical manner which focused on the types of cloud computing, industries, deployments and models of delivery. This constant issue is becoming more impactful because of the emerging challenges in cloud computing technology management. From the client’s point of view, the security in cloud computing is hazardous, typically in the matter of assurance affirmation problems and securing the data. These problems create shortcomings that hinder the adoption of cloud computing administrations. This paper inspects and illustrates the critical issues of cloud computing in relation to the privacy and protection on the Cloud. Lastly, this paper is concluded with a review to the literature stated as well suggesting on-going future studies. Keywords: Cloud computing, Data security, Data privacy, Cloud Cryptography, Security threats.

 

References:

REFRENCES: [1] Mell P, Grance T. The NIST definition of cloud computing. 2011.

[2] Nemati H, Singhvi A, Kara N, El Barachi M, editors. Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem. Globecom Workshops (GC Wkshps), 2014; of Conference.

[3] Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems.25(6):599- 616,2009.

[4] Ahmed HAS, Ali MH, Kadhum LM, Zolkipli MF, Alsariera YA. A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC).9(1-2):87-91,2017.

[5] Li Q, Wang Z-y, Li W-h, Li J, Wang C, Du R-y. Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems.7(3):237-71,2013.

 [6] Abbas H, Maennel O, Assar S. Security and privacy issues in cloud computing. Springer,2017.

 [7] Grobauer B, Walloschek T, Stöcker E. Understanding cloud computing vulnerabilities. Security & privacy, IEEE.9(2):50-7,2011.

 [8] Khan N, Al-Yasiri A. Cloud security threats and techniques to strengthen cloud computing adoption framework. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: IGI Global; 2018. p. 268-85.

[9] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications.34(1):1-11,2011.

 [10] Al-Badi A, Tarhini A, Al-Kaaf W. Financial Incentives for Adopting Cloud Computing in Higher Educational Institutions. Asian Social Science.13(4):162,2017.

[11] Catteddu D. Cloud Computing: benefits, risks and recommendations for information security. Web Application Security: Springer; 2010. p. 17- .

 [12] Satyanarayanan M. The emergence of edge computing. Computer.50(1):30-9,2017.

 [13] Ghosh R, Longo F, Frattini F, Russo S, Trivedi KS. Scalable analytics for iaas cloud availability. Cloud Computing, IEEE Transactions on.2(1):57-70,2014.

[14] Guerrero-Contreras G, Garrido JL, BalderasDiaz S, Rodríguez-Domínguez C. A contextaware architecture supporting service availability in mobile cloud computing. IEEE Transactions on Services Computing.10(6):956- 68,2017.

[15] Ge J, Wu Y, Li T, Yuepeng E, Zhang C, editors. Experimenting adaptive services in sea-cloud innovation environment. Computer Communications Workshops (INFOCOM WKSHPS),