A Behaviour Study on Cloud Eco-System: Data Security Perspective
Main Article Content
Abstract
Cloud eco-system is a revolution now, which modifies the way in which the IT-based services are being delivered to end customers. It is increasing or we can also say grown-up technology that delivers multiple benefits whether in terms of economics or in terms of cost-effective resource utilization. The ability to install and improve their services on that platform is made possible by the advent of cloud computing, which opens up new options for long-term solutions. Cloud computing's environmental and economic impacts must be considered while assessing its long-term viability. A growing number of organizations, businesses, and personal users are depending on services supplied by the cloud and keeping crucial information in the cloud because of its easy-to-use characteristics. The cloud, despite its widespread use, nevertheless has a number of drawbacks when it comes to data security. Customers are concerned about how their personal information is transported to and from the cloud. Research articles in this topic have been thoroughly analyzed and examined in this report.
Article Details
References
Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N: Cloud Computing: A Statistics Aspect of Users. In First International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer Berlin; 2009:347–358.
Zhang S, Zhang S, Chen X, Huo X: Cloud Computing Research and Development Trend. In Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China. Washington, DC, USA: IEEE Computer Society; 2010:93–97.
Cloud Security Alliance: Security guidance for critical areas of focus in Cloud Computing V3.0.. 2011.
Marinos A, Briscoe G: Community Cloud Computing. In 1st International Conference on Cloud Computing (CloudCom), Beijing, China. Heidelberg: Springer-Verlag Berlin; 2009.
Khalid A: Cloud Computing: applying issues in Small Business. International Conference on Signal Acquisition and Processing (ICSAP’10) 2010, 278–281.
Mr. Dharmesh Dhabliya. (2012). Intelligent Banal type INS based Wassily chair (INSW). International Journal of New Practices in Management and Engineering, 1(01), 01 - 08. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/2
Jorvekar, G. N. ., Arjariya, T. ., & Gangwar, M. . (2023). Hybrid Feature Selection Techniques for Aspect based Sentiment Classification using Supervised Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), 211 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2619
Rosado DG, Gómez R, Mellado D, Fernández-Medina E: Security analysis in the migration to cloud environments. Future Internet 2012, 4(2):469–487.
Joseph Miller, Peter Thomas, Maria Hernandez, Juan González,. Adaptive Decision Making using Reinforcement Learning in Decision Science. Kuwait Journal of Machine Learning, 2(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/204
Li W, Ping L: Trust model to enhance Security and interoperability of Cloud environment. In Proceedings of the 1st International conference on Cloud Computing. Beijing, China: Springer Berlin Heidelberg; 2009:69–79.
N. Akhter and M. Othman, “Energy aware resource allocation of cloud data center: Review and open issues,” Cluster Computing, vol. 19, no. 3, pp. 1163–1182, 2016.
S. Singh, A. Swaroop, A. Kumar, et al., “A survey on techniques to achive energy efficiency in cloud computing,” in 2016 International conference on computing, communication and automa- tion (ICCCA), IEEE, 2016, pp. 1281–1285.
M. Zakarya and L. Gillam, “Energy efficient computing, clusters, grids and clouds: A taxonomy and survey,” Sustainable Computing: Informatics and Systems, vol. 14, pp. 13–33, 2017.
Q. Shaheen, M. Shiraz, S. Khan, R. Majeed, M. Guizani, N. Khan, and A. M. Aseere, “Towards energy saving in computational clouds: Taxonomy, review, and open challenges,” IEEE Access, vol. 6, pp. 29 407–29 418, 2018.
S. Puhan, D. Panda, and B. K. Mishra, “Energy efficiency for cloud computing applications: A survey on the recent trends and future scopes,” in 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), IEEE, 2020, pp. 1–6.
S. Kaur and S. Bawa, “A review on energy aware vm placement and consolidation techniques,” in InternationalConferenceonInventiveComputationTechnologies(ICICT), IEEE, vol. 3, 2016, pp. 1–7.
Jensen, M., Schwenk, J., Gruschka, N., &Iacono, L.L. (2009, September). On technical security issues in cloud computing. In 2009 IEEE International Conference on Cloud Computing (pp. 109-116). Ieee.
Sharma, M. K. (2021). An Automated Ensemble-Based Classification Model for The Early Diagnosis of The Cancer Using a Machine Learning Approach. Machine Learning Applications in Engineering Education and Management, 1(1), 01–06. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/1
Hashizume, K., Rosado, D.G., Fernández-Medina, E., & Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 5.