A Comprehensive Survey of Cloud Computing, Encompassing Architectures, Data Storage, Services, Security, and Applications

K. Joslin*
Department of Artificial Intelligence and Data Science, R. M. K Engineering College, Kavaraipettai, Thiruvallur, Chennai, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jcc.10.2.20417

Abstract

Generally, enterprises store data in internal storage and establish firewalls to protect against intruders attempting to access the data. In cloud computing, data is stored in storage provided by service providers. Information privacy protection involves storing data in encrypted form. The cloud system is responsible for both storage and the encryption or decryption of data, allowing system administrators to access encrypted data and decryption keys. This capability poses a risk to information privacy as it enables unauthorized access to information. This survey discusses Data Storage in Cloud Computing, focusing on the concept of storing encryption and decryption services alongside the storage service. Additionally, the survey examines storage system architecture, security challenges, services, and user application systems to provide a comparison of various cloud models. In addition to the fundamental aspects of data storage and encryption, this survey delves into the evolving landscape of cloud computing, addressing the dynamic nature of storage system architectures. Enterprises increasingly rely on cloud service providers for scalable and flexible storage solutions, prompting a critical examination of the security challenges associated with this paradigm shift. The survey examines how storage services in different cloud models affect user applications and privacy. It stresses the importance of understanding cloud providers' services amidst evolving technology and growing threats. The study delves into trends like edge computing and distributed storage, evaluating their impact on cloud storage security. Overall, it aims to provide a comprehensive overview for enterprises and researchers to make informed decisions on data security in Cloud Computing.

Keywords

Cloud Computing, Data Storage, Encryption/Decryption Data, Security System, Virtualization, Cloud Deployment Models, Cloud Governance.

How to Cite this Article?

Joslin, K. (2023). A Comprehensive Survey of Cloud Computing, Encompassing Architectures, Data Storage, Services, Security, and Applications. i-manager's Journal on Cloud Computing, 10(2), 24-34. https://doi.org/10.26634/jcc.10.2.20417

References

[3]. Benzekki, K., El Fergougui, A., & El Alaoui, A. E. B. (2016). A secure cloud computing architecture using homomorphic encryption. International Journal of Advanced Computer Science and Applications, 7(2), 293-298.
[9]. Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 148-154.
[10]. Kumar, S., & Goudar, R. H. (2012). Cloud computingresearch issues, challenges, architecture, platforms and applications: a survey. International Journal of Future Computer and Communication, 1(4), 356.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.