Cloud Computing: Fundamentals and Research Issues

Nowadays, access control and data security are two most critical problems with cloud computing. Access control can be defined as a procedure by which users can access data from the cloud server. At the time of accessing data, there are many problems, such as data security, high data accessing time, data lost, overhead, data redundancy, etc. In the first part of this paper, a brief discussion of fundamentals of cloud computing are presented. Moreover, all the issues of cloud computing are also discussed in this paper. Finally, future work directions have been identified for the cloud computing environment.

[1]  Michael Kavis Cloud Service Models , 2014 .

[2]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[3]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[4]  L. Padma Suresh,et al.  Artificial Intelligence and Evolutionary Algorithms in Engineering Systems , 2015 .

[5]  Derrick Rountree,et al.  Chapter 4 – Cloud Service Models , 2013, CloudCom 2013.

[6]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[7]  John C. Grundy,et al.  An Analysis of the Cloud Computing Security Problem , 2016, APSEC 2010.

[8]  Pinki Roy,et al.  Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..

[9]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[10]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[11]  Pinki Roy,et al.  A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..

[12]  P. Venkata Krishna,et al.  Enhanced Role-Based Access Control for Cloud Security , 2015 .

[13]  Philip K. McKinley,et al.  Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[14]  B. Balamurugan,et al.  Extensive Survey on Usage of Attribute Based Encryption in Cloud , 2014 .

[15]  Pinki Roy,et al.  A new secure authentication scheme for cloud computing environment , 2017, Concurr. Comput. Pract. Exp..

[16]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[17]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[18]  P. Venkata Krishna,et al.  An Efficient Framework for Health System Based on Hybrid Cloud with ABE-Outsourced Decryption , 2015 .

[19]  Abhishek Majumder,et al.  Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).

[20]  Abhishek Majumder,et al.  Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .