Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)

Authors

  • Shailja Sharma Department of Computer Science & Engineering, RNTU University, Bhopal
  • Sheeba Khan IPER college , Bhopal

Keywords:

Cloud Storage, Cloud Performance, Cloud Scalability, Cloud Availability, Cloud Security, Cloud Access Control, Document Sharing

Abstract

Present trends and advancement in technology have increase to the success and admire of computing in cloud. Computing in cloud provides services on demand. Computing of the cloud formulate make use of complicated remote network sites and servers that are associated with the internet for storing, managing and data processing of data, rather than a server of (LAN) Local Area Network or a single computer. Now a day, computing of cloud is extremely demanded service because of the advantages like powerful computing, low cost of services, high performance, scalability, reliability, accessibility and availability. This investigation of research discusses the performance, issues in security and challenges in environment of cloud data. This survey provides insights to study recent cloud issues and cloud challenges.

 

References

Shoaib Hassan, Asim Abbas kamboh, Dr. Farooque Azam “Analysis of Cloud Computing Performance, Scalability, Availability & Security”, In the Proceedings of the 2014 International Conference on Information Science & Applications (ICISA), Seoul, South Korea, 978-1-4799-4441-5/14/$31.00 ©2014 IEEE.

Chao YANG, Weiwei LIN, Mingqi LIU “A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security”, In the Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi`an, China, pp.437-442, 2013, 978-0-7695-5044-2/13 $26.00 © 2013 IEEE.

J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue. 5, pp. 3–22, 2012.

M. A. Vouk, “Cloud computing - Issues, research and implementations”, In Proceeding of the 2008 30th International Conference. On Information Technology Interfaces(ITI), Cavtat, Croatia, pp. 31–40, 2008.

P. S. Wooley, “Identifying Cloud Computing Security Risks,” University of Oregon, pp.1-88 February, 2011.

F. B. Shaikh, S. Haider, “Security Threats in Cloud Computing”, In Proceeding of the 2011 International Conferenceon Internet Technology and Secured Transactions,Abu Dhabi,2011, pp. 11-14, 978-1-908320-00-1/11/$26.00 ©2011 IEEE..

Abdulrahman, Alharthi, Fara Yahya, Robert J. Walters and Gary B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions ”, In Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA-2015), pp.102–109.

Dan Lin and Anna Squicciarini, “Data Protection Models for Service Provisioning in the Cloud”, In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT, 2010), Pittsburgh,Pennsylvania, USA.

J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” In Proceeding of 2009 8th International conference on Dependable, Autonomic and Secure Computing, Chengdu, China,, pp. 735–740, 2009.

Downloads

Published

2019-03-10

How to Cite

[1]
S. Sharma and S. Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 1, pp. 13–15, Mar. 2019.

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.