Full Paper View Go Back
Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)
Shailja Sharma1 , Sheeba Khan2
Section:Review Paper, Product Type: Journal
Vol.7 ,
Issue.1 , pp.13-15, Mar-2019
Online published on Mar 10, 2019
Copyright © Shailja Sharma, Sheeba Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Shailja Sharma, Sheeba Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA),” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, pp.13-15, 2019.
MLA Style Citation: Shailja Sharma, Sheeba Khan "Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)." International Journal of Scientific Research in Network Security and Communication 7.1 (2019): 13-15.
APA Style Citation: Shailja Sharma, Sheeba Khan, (2019). Analysis of Cloud Security, Performance, Scalability and Availability (SPSA). International Journal of Scientific Research in Network Security and Communication, 7(1), 13-15.
BibTex Style Citation:
@article{Sharma_2019,
author = {Shailja Sharma, Sheeba Khan},
title = {Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {3 2019},
volume = {7},
Issue = {1},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {13-15},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=358},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=358
TI - Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Shailja Sharma, Sheeba Khan
PY - 2019
DA - 2019/03/10
PB - IJCSE, Indore, INDIA
SP - 13-15
IS - 1
VL - 7
SN - 2347-2693
ER -
Abstract :
Present trends and advancement in technology have increase to the success and admire of computing in cloud. Computing in cloud provides services on demand. Computing of the cloud formulate make use of complicated remote network sites and servers that are associated with the internet for storing, managing and data processing of data, rather than a server of (LAN) Local Area Network or a single computer. Now a day, computing of cloud is extremely demanded service because of the advantages like powerful computing, low cost of services, high performance, scalability, reliability, accessibility and availability. This investigation of research discusses the performance, issues in security and challenges in environment of cloud data. This survey provides insights to study recent cloud issues and cloud challenges.
Key-Words / Index Term :
Cloud Storage, Cloud Performance, Cloud Scalability, Cloud Availability, Cloud Security, Cloud Access Control, Document Sharing.
References :
[1] Shoaib Hassan, Asim Abbas kamboh, Dr. Farooque Azam “Analysis of Cloud Computing Performance, Scalability, Availability & Security”, In the Proceedings of the 2014 International Conference on Information Science & Applications (ICISA), Seoul, South Korea, 978-1-4799-4441-5/14/$31.00 ©2014 IEEE.
[2] Chao YANG, Weiwei LIN, Mingqi LIU “A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security”, In the Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi`an, China, pp.437-442, 2013, 978-0-7695-5044-2/13 $26.00 © 2013 IEEE.
[3]J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue. 5, pp. 3–22, 2012.
[4]M. A. Vouk, “Cloud computing - Issues, research and implementations”, In Proceeding of the 2008 30th International Conference. On Information Technology Interfaces(ITI), Cavtat, Croatia, pp. 31–40, 2008.
[5]P. S. Wooley, “Identifying Cloud Computing Security Risks,” University of Oregon, pp.1-88 February, 2011.
[6]F. B. Shaikh, S. Haider, “Security Threats in Cloud Computing”, In Proceeding of the 2011 International Conferenceon Internet Technology and Secured Transactions,Abu Dhabi,2011, pp. 11-14, 978-1-908320-00-1/11/$26.00 ©2011 IEEE..
[7]Abdulrahman, Alharthi, Fara Yahya, Robert J. Walters and Gary B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions ”, In Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA-2015), pp.102–109.
[8]Dan Lin and Anna Squicciarini, “Data Protection Models for Service Provisioning in the Cloud”, In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT, 2010), Pittsburgh,Pennsylvania, USA.
[9] J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” In Proceeding of 2009 8th International conference on Dependable, Autonomic and Secure Computing, Chengdu, China,, pp. 735–740, 2009.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.