A Survey on Cloud Computing Parameters

  • Sonali Patil
Keywords: Availability,Cloud Computing, Confidentiality, Integrity,Security.

Abstract

In today's technological world, virtual resources and services are more demanded over the network and internet. Cloud Computing (CC) is an on-demand service over network servers which are hosted on Internet to process, store and organize the data. Cloud computing is the best solution in all terms like scalability, cost, flexibility, and efficiency. Cloud computing have various parameters and different aspects. The different aspect of cloud computing like security, integrity, confidentiality, reliability and availability are explained in this survey. As there are many advantages of cloud, there are also some disadvantages of cloud. In this paper some issues and algorithms related to every parameter are reviewed. For every aspect of cloud computing, after studying many algorithms one of them is chosen as solution and discussed in this paper.

References

[1] MaximillianoDestefaniNeto “A brief history of cloud computing”, Cloud computing news online. [2] “Cloud computing ” online on Wikipedia. [3] William Stalling,“Cryptography and Network Security-Principles and Practices”, book, Page 314-328. [4] “Blowfish Algorithm ” online on Wikipedia. [5] Tanjyot Aurora1, Parul Arora2. (2013). “Blowfish Algorithm”. International Journal of Computer Science and Communication Engineering IJCSCE. [6] MsNehaKhatri – Valmik1, Prof. V. K Kshirsagar2 .(March-April 2014).“ Blowfish Algorithm”.IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2.www.iosrjournals.org [7] AviKakLecture Notes on “Computer and Network Security”. [8] Nareshvurukonda, B.ThirumalaRao, (ICCC-2016)“A Study on Data Storage Security Issues in Cloud Computing”. 2nd International Conference on Intelligent Computing, Communication & Convergence. [9] “RSA Algorithm ” online on Wikipedia. [10] AkashdeepBhardwaj, GVB Subrahmanyam, VinayAvasthi, HanumatSastry, “Security Algorithms for Cloud Computing”, ScienceDirect ELSEVIER, journal Procedia Computer Science 85, 2016,pp. 535 – 542. [11] PriyadarshiniPatil, PrashantNarayankar, Narayan D G, Meena S M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES,3DES, AES, RSA and Blowfish.”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015,Nagpur, INDIA. ScienceDirect ELSEVIER 2016, pp 617-624. [12] K.Devika, M.Jawahar, “ Review On: Cryptographic Algorithms for Data Integrity Proofs in Cloud Storage”,International Journal of Engineering Trends and Applications (IJETA) – Volume 2 Issue 1, Jan-Feb 2015, pp. 1419. [13] RajatSaxena∗and SomnathDey, “Cloud Audit: A Data Integrity Verification Approach for CloudComputing”,ScienceDirect ELSEVIER, Twelfth International Multi-Conference on Information Processing-2016
Published
2018-04-15
How to Cite
Patil, S. (2018). A Survey on Cloud Computing Parameters. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 4(I). Retrieved from http://asianssr.org/index.php/ajct/article/view/532
Section
Computer Science and Engineering

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.