A Review on Disruptive Technology – “Cloud Computing” -Roadmap to Models and Security Threats and Causes

Sabibullah Mohamed Hanifa*
*Associate Professor & Dean, PG & Research Department of Computer Science, Sudharsan College of Arts & Science, Tamilnadu, India.
Periodicity:May - July'2016
DOI : https://doi.org/10.26634/jcc.3.3.8299

Abstract

Cloud Computing (CC) is accomplished on the top of Gartner's list of the ten most disruptive technologies of the next years. It has been measured as a significant step towards achieving the long-held dream of envisioning computing as a utility. It provides a great chance to supply storage, processing, and visualization resources for sensing-based healthcare data also. Flexibility, scalability, computing and application resources, optimal utilization of infrastructure and reduced costs are the major cloud-based services. CC comes with abundant possibilities and challenges concurrently of which security / threats is most well-thought out vital barrier for cloud computing path to success. When putting and transmitting data using public networks exposed to the world, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model along with cloud deployment model in the cloud environment. This paper covers the roadmap on this machinery in detail so that “robust security application models” can be created / deployed easily with possible uncovered breaches.

Keywords

Cloud Computing, Disruptive Technology, Data Breach, Service Delivery Model, Visualization

How to Cite this Article?

Hanifa, S. M. (2016). A Review on Disruptive Technology – “Cloud Computing” -Roadmap to Models and Security Threats and Causes. i-manager’s Journal on Cloud Computing, 3(3), 33-39. https://doi.org/10.26634/jcc.3.3.8299

References

[1]. Gartner, (2008). “Gartner top ten disruptive technologies for 2008 to 2012”. Emerging Trends and Technologies Roadshow. Technical Report.
[2]. J. Geelan, (2008). “Twenty one experts define cloud computing virtualization”. Containers Expo Journal. Retrieved from http://virtualization.sys-con. com /node/612375
[3]. R. Buyya, C.S. Yeo., S. Venugopal, J. Broberg., and I. Brandic, (2009). “Cloud computing and emerging IT Platforms: Vision, Hype, and Reality of delivering th computing as the 5 Utility”. Future Generation Computer Systems, Vol. 25, pp. 599-616.
[4]. K. Ren, Cong Wang, and Q. Wang, (2012). “Security challenges for the Public cloud”. Internet Computing, IEEE, Vol. 16, No. 1, pp. 69-73, Retrieved from DOI: 10.1109/MIC.2012.14.
[5]. L. Youseff, M. Butrico, and D. Da Silva, (2008). “Toward a Unified Ontology of cloud computing”. Proc. of the Grid Computing Environments Workshop, pp. 12-16, Retrieved from DOI:10.1109/GCE.2008.4738443
[6]. Z. Xiao, and Y. Xiao, (2013). “Security and Privacy in Cloud computing”. Communications Surveys and Tutorials IEEE, Vol. 15, No. 2, pp. 843-859, Retrieved from DOI:10.1109/ SURV.2012.060912.00182
[7]. D. Zissis, and D. Lekkas, (2012). “Addressing Cloud Computing Security Issues”. Future Generation Computing Systems, pp. 583-592.
[8]. N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho, M. Simplicio, and M. Pourzandi, (2011). “A quantitative analysis of current security concerns and solutions for cloud computing”. Cloud Computing Technology and rd Science (CloudCom), IEEE 3 Intl., Conf. on, pp:231-238, Retrieved from DOI:10.1109/CloudCom.2011.39
[9]. J. Dean, and S. Ghemawat, (2008). “MapReduce simplified data processing on large clusters”. ACM Communication, pp. 107-113, Retrieved from DOI:10.1145./1327452. 1327492
[10]. L.M. Vaquero, L. Rodero-Merino, J. Caseres, and M. Lindner, (2008). “A break in the clouds: Towards a cloud definition”. ACM SIGCOMM Computer Communication Review, Vol. 39, No. 1, pp. 50-55.
[11]. D.B. Hoang, and L. Chen, (2010). “Mobile cloud for assistive healthcare”. IEEE Asia-Pacific Ser vices Computing Conference (APSCC), pp. 325-332.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.