Open Access
Subscription Access
Research in Cloud Computing-An Overview
Subscribe/Renew Journal
Cloud computing is an Internet based resource sharing which trigger broad network access. This cloud computing technology is a new technology which delivers a new model for information and services by means of an existing grid computing technology. Further, this new technology uses Internet infrastructure to communicate between the client and the server side service applications. Apart from this, cloud computing has cloud service provider they offers cloud platform for their customers to create and use web oriented services. The hardware and software resource sharing is possible in cloud with the help of internet and it can be managed and maintained by the third party cloud service provider. The cloud service provider facilitates cloud computing to increase the capacity or add capability, for example without investing in a new infrastructure, training new people or licensing new software. It is packed with a new infrastructure to improve the services like scalability, elasticity, business agility, faster start up time, reduced management cost and availability of resources. This special Internet based shared resource has its own conceptual, technical, economical and user experience characteristics. Nowadays, cloud computing has become one of the most important and popular research areas in the field of computer science. Many open research problems are available in cloud computing and good solutions also been proposed by the researchers by developing new techniques and efficient algorithms. In this paper, a detailed study about cloud computing, its basic concepts, history, virtualisa tiontechnique, and cloud services are discussed. In addition to this, research issues in cloud computing also discussed.
Keywords
Cloud Computing, Virtualization, Brokering Services, Research Issues, Security Issues.
Subscription
Login to verify subscription
User
Font Size
Information
- Angadi, A. B., Angadi, A. B., & Gull, K. C. (2013). Security issues with possible solutions in cloud computingA survey. International Journal of Advanced Research in Computer Engineering and Technology, February, 2(2), 652-661.
- Azcuy, J. (2009). Centralized vs distributed Computing: Director of Service Delivery: Posted & Filed under Technical Education.
- Bhadauria, R., & Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques.
- Cuomo, A. & Di Mobica, G. (2012). An SLA based broker for cloud infrastructure. Journal of Grid Computing. DOI 10723-012-9241-4.
- Gampala, V., Inuganti, S., & Muppidi, S. (2012). Data security in cloud computing with elliptic curve cryptography. International Journal of Soft Computing and Engineering, July, 2(3), 138-141.
- Gong, C., Liu, J., Zhang, Q., Chen, H., & Gong, Z. (2010). The characteristics of cloud computing. Paper Presented at the 2010 International Conference on Parallel Processing Workshops in China.
- Jamil, D., & Zaki, H. (2011). Cloud computing security. International Journal of Engineering Science and Technology, 3(4), 3478-3483.
- Jansen, W., & Grance, T. (2011). Guidelines on security and privacy in public and private cloud computing. National Institute of Standards and Technology.
- Kaur, A., & Raj, G. (2013). Secure broker cloud computing paradigm using AES and selective AES algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, March, 3(3), 79-83.
- Mishra, M. & Sudevalayam, S. (n. d. ) Introduction to cloud computing and virtualization. CSE, IIT Bombay.
- Neto, M. D. (2014). A Brief History of Cloud Computing.
- Pai, M. K., & Jayalakshmi, D. S. (2013). Survey on privacy and data security issues in cloud computing: A survey. International Journal of Engineering and Advanced Technology, 2(5), 129-134.
- Raj, G., & Kaur, K. (2012). Secure cloud communication for effective cost management system through MSBE. International Journal on Cloud Computing: Services and Architecture, June, 2(3), 19-30.
- Rani, A. M. G., & Marimuthu, A. (2013). An Investigation on the Issues in Cloud Data Security. International Journal of Computer Applications, November, 82(1), 39-43.
- Singh, N., & Raj, R. (2012). Security on BCCP through AES encryption techniques. International Journal on Engineering Science and Advanced Technology, 2(4), 813-819.
- Subashini, S., & Kavitha, V. (2010). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, July, 34(1), 1-11.
- Velte, A. T., Velte, T. J., & Elsenpeter, R. (2009). Cloud Computing: A Practical Approach.
- Younge, A. J., Laszewski, G. V., Wang, L. (2010). Efficient resource management for cloud computing environments. Proceedings of the International Conference on Green Computing.
Abstract Views: 533
PDF Views: 226