Cloud Computing Environment and Security Challenges: A Review

Abstract

Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few years due to the scalability of resources and appear as a fast-growing segment of the IT industry. The dynamic and scalable nature of cloud computing creates security challenges in their management by examining policy failure or malicious activity. In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats. The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing. The security solution using the cryptography is specifically as the Public Key Infrastructure (PKI) that operates with Single-Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) which ensure the integrity, confidentiality, availability, and authenticity involved in communications and data.

Authors and Affiliations

Muhammad Faheem Mushtaq, Urooj Akram, Irfan Khan, Sundas Naqeeb Khan, Asim Shahzad, Arif Ullah

Keywords

Related Articles

Bio-inspired Think-and-Share Optimization for Big Data Provenance in Wireless Sensor Networks

Big data systems are being increasingly adopted by the enterprises exploiting big data applications to manage data-driven process, practices, and systems in an enterprise wide context. Specifically, big data systems and...

A new optimization based image segmentation method by particle swarm optimization

 This paper proposes a new multilevel thresholding method segmenting images based on particle swarm optimization (PSO). In the proposed method, the thresholding problem is treated as an optimization problem, and sol...

 Transform Domain Fingerprint Identification Based on DTCWT

 The physiological biometric characteristics are better compared to behavioral biometric identification of human beings to identify a person. In this paper, we propose Transform Domain Fingerprint Identification Bas...

Dynamic Inertia Weight Particle Swarm Optimization for Solving Nonogram Puzzles

Particle swarm optimization (PSO) has shown to be a robust and efficient optimization algorithm therefore PSO has received increased attention in many research fields. This paper demonstrates the feasibility of applying...

Density based Clustering Algorithm for Distributed Datasets using Mutual k-Nearest Neighbors

Privacy and security have always been a concern that prevents the sharing of data and impedes the success of many projects. Distributed knowledge computing, if done correctly, plays a key role in solving such a problem....

Download PDF file
  • EP ID EP262228
  • DOI 10.14569/IJACSA.2017.081025
  • Views 69
  • Downloads 0

How To Cite

Muhammad Faheem Mushtaq, Urooj Akram, Irfan Khan, Sundas Naqeeb Khan, Asim Shahzad, Arif Ullah (2017). Cloud Computing Environment and Security Challenges: A Review. International Journal of Advanced Computer Science & Applications, 8(10), 183-195. https://europub.co.uk/articles/-A-262228