Abstract

By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security viewpoint, several issues and problems were discussed regarding the cloud transfer. The goal of this study is to represent a general security viewpoint of cloud computing through signifying the security problems that must be focused and accomplished appropriately for identifying a better perspective about current world of cloud computing. This research also is to clarify the particular interrelationships existing between cloud computing security and other associated variables such as data security, virtual machine security, application security and privacy. In addition, a model of cloud computing security which depends on the investigation regarding previous studies has been developed. To examine the model a type of descriptive survey is applied. The survey sample population is selected from employers and managers IT companies in Malaysia. By testing the correlation, the results of study indicated that there are those identified security challenges in current world of cloud computing. Furthermore, the results showed that the cloud computing security correlation with data security, virtual machine security, application security and privacy is positive.

Highlights

  • Cloud computing refers to the next-generation architecture of IT enterprise

  • Regarding the multi-tenant features, service delivery and deploy models of cloud computing usually associates with the previous IT settings, though, cloud computing might have several risks and problems too [2].The most important goal of this study is to classify, categorize and establish the most important security problems associated with cloud computing which that were discussed in the related literature

  • While our results show that whole, factors on current world of cloud computing are distinct constructs and it appears that all factors are well correlated with Cloud Computing Security

Read more

Summary

INTRODUCTION

Cloud computing refers to the next-generation architecture of IT enterprise. This approach usually focuses on financial utility model by developing several existing methods and computing technology that include distributed application, facilities, and IT infrastructures of computers, networks, and storing capitals [1]. Because of the high interest about toward the cloud computing, there is an important worry about the evaluation of the current tendencies in security of that technology. Followings are considered as the benefits of using cloud computing: i) decreasing the price of hardware and related maintenance charges, ii) it is accessible all over the world, and iii) it has flexible and the extremely automatic procedure, in that the clients are not usually worried about upgrading the software which is a daily manner [3]. Regarding the multi-tenant features, service delivery and deploy models of cloud computing usually associates with the previous IT settings, though, cloud computing might have several risks and problems too [2].The most important goal of this study is to classify, categorize and establish the most important security problems associated with cloud computing which that were discussed in the related literature

CLOUD COMPUTING TYPES AND SERVICES MODEL
CLOUD COMPUTING TYPES AND SERVICE MODEL OF DELIVERY
CLOUD COMPUTING SECURITY ISSUES
Virtual machine level security
PROPOSED MODEL
THE RELATIONSHIP OF SECURITY CLOUD COMPUTING FACTORS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.