Cloud Computing Environment and Security Challenges: A Review

Abstract

Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few years due to the scalability of resources and appear as a fast-growing segment of the IT industry. The dynamic and scalable nature of cloud computing creates security challenges in their management by examining policy failure or malicious activity. In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats. The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing. The security solution using the cryptography is specifically as the Public Key Infrastructure (PKI) that operates with Single-Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) which ensure the integrity, confidentiality, availability, and authenticity involved in communications and data.

Authors and Affiliations

Muhammad Faheem Mushtaq, Urooj Akram, Irfan Khan, Sundas Naqeeb Khan, Asim Shahzad, Arif Ullah

Keywords

Related Articles

Domain and Schema Independent Semantic Model Verbalization: A Conceptual Overview

Semantic Web-based technologies have become extremely popular and its a success that has spread across many domains, additional to the computer science domain. Nevertheless, the reusability aspects associated with the cr...

A Convolutional Neural Network for Automatic Identification and Classification of Fall Army Worm Moth

To combat the problem caused by the Fall Army Worm in the country there is a need to come up with robust early warning and monitoring systems as the current manual system is labor intensive and time consuming. The automa...

On the Dynamic Maintenance of Data Replicas based on Access Patterns in A Multi-Cloud Environment

Cloud computing provides services and infrastructures to enable end-users to access, modify and share massive geographically distributed data. There are increasing interests in developing data-intensive (big data) applic...

Performance Analysis of Machine Learning Techniques on Software Defect Prediction using NASA Datasets

Defect prediction at early stages of software development life cycle is a crucial activity of quality assurance process and has been broadly studied in the last two decades. The early prediction of defective modules in d...

Studying the Impact of Water Supply on Wheat Yield by using Principle Lasso Radial Machine Learning Model

Wheat plays a vital role in the food production as it fulfills 60% requirements of calories and proteins to the 35% of the world population. Owing to wheat importance in food, wheat demand is increasing continuously. Whe...

Download PDF file
  • EP ID EP262228
  • DOI 10.14569/IJACSA.2017.081025
  • Views 96
  • Downloads 0

How To Cite

Muhammad Faheem Mushtaq, Urooj Akram, Irfan Khan, Sundas Naqeeb Khan, Asim Shahzad, Arif Ullah (2017). Cloud Computing Environment and Security Challenges: A Review. International Journal of Advanced Computer Science & Applications, 8(10), 183-195. https://europub.co.uk/articles/-A-262228