Full Paper View

Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)

Shailja Sharma1 , Sheeba Khan2

Section:Review Paper, Product Type: Journal
Vol.7 , Issue.1 , pp.13-15, Mar-2019

Online published on Mar 10, 2019


Copyright © Shailja Sharma, Sheeba Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

Citation :
IEEE Style Citation: Shailja Sharma, Sheeba Khan, “Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)”, International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.1, pp.13-15, 2019.

MLA Style Citation: Shailja Sharma, Sheeba Khan "Analysis of Cloud Security, Performance, Scalability and Availability (SPSA)." International Journal of Scientific Research in Network Security and Communication 7.1 (2019): 13-15.

APA Style Citation: Shailja Sharma, Sheeba Khan, (2019). Analysis of Cloud Security, Performance, Scalability and Availability (SPSA). International Journal of Scientific Research in Network Security and Communication, 7(1), 13-15.

12 Views    11 Downloads    3 Downloads
  
  

Abstract :
Present trends and advancement in technology have increase to the success and admire of computing in cloud. Computing in cloud provides services on demand. Computing of the cloud formulate make use of complicated remote network sites and servers that are associated with the internet for storing, managing and data processing of data, rather than a server of (LAN) Local Area Network or a single computer. Now a day, computing of cloud is extremely demanded service because of the advantages like powerful computing, low cost of services, high performance, scalability, reliability, accessibility and availability. This investigation of research discusses the performance, issues in security and challenges in environment of cloud data. This survey provides insights to study recent cloud issues and cloud challenges.

Key-Words / Index Term :
Cloud Storage, Cloud Performance, Cloud Scalability, Cloud Availability, Cloud Security, Cloud Access Control, Document Sharing.

References :
[1] Shoaib Hassan, Asim Abbas kamboh, Dr. Farooque Azam “Analysis of Cloud Computing Performance, Scalability, Availability & Security”, In the Proceedings of the 2014 International Conference on Information Science & Applications (ICISA), Seoul, South Korea, 978-1-4799-4441-5/14/$31.00 ©2014 IEEE.
[2] Chao YANG, Weiwei LIN, Mingqi LIU “A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security”, In the Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi`an, China, pp.437-442, 2013, 978-0-7695-5044-2/13 $26.00 © 2013 IEEE.
[3]J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing Basics”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue. 5, pp. 3–22, 2012.
[4]M. A. Vouk, “Cloud computing - Issues, research and implementations”, In Proceeding of the 2008 30th International Conference. On Information Technology Interfaces(ITI), Cavtat, Croatia, pp. 31–40, 2008.
[5]P. S. Wooley, “Identifying Cloud Computing Security Risks,” University of Oregon, pp.1-88 February, 2011.
[6]F. B. Shaikh, S. Haider, “Security Threats in Cloud Computing”, In Proceeding of the 2011 International Conferenceon Internet Technology and Secured Transactions,Abu Dhabi,2011, pp. 11-14, 978-1-908320-00-1/11/$26.00 ©2011 IEEE..
[7]Abdulrahman, Alharthi, Fara Yahya, Robert J. Walters and Gary B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions ”, In Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA-2015), pp.102–109.
[8]Dan Lin and Anna Squicciarini, “Data Protection Models for Service Provisioning in the Cloud”, In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT, 2010), Pittsburgh,Pennsylvania, USA.
[9] J. Hu and A. Klein, “A benchmark of transparent data encryption for migration of web applications in the cloud,” In Proceeding of 2009 8th International conference on Dependable, Autonomic and Secure Computing, Chengdu, China,, pp. 735–740, 2009.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Impact Factor

Journals Contents

Author & Reviewer

Download

Digital Certificate

Go to Navigation