A taxonomy of : The reviews on Cloud Computing Direction (CCD)

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The manufacturing industry is undergoing a major transformation enabled by IT and related smart technologies. The main thrust of Cloud computing is to provide on-demand computing services with high reliability, scalability and availability in a distributed environment. This paper summarizes our taxonomy of the CC review direction. The goals of this taxonomy were (i) clarify the needs and the directions of the use of the CC, (ii) define the academic and practical issues involved in CC , (iii) learn the state of the directions on methodologies of the CC , (iv) identify future research directions, which benefit the short and long terms. The taxonomy has concluded that (i) CC is advantageous in dealing with changes and uncertainties in the every-changing environment. (ii)It has been found that few existing CC can achieve the objective of security. (iii) The obstacles of the development of CC include the difficulties to identify and generalize the requirement of CC security, the lake of effective technologies that can be used to support the clouding use, and no international origination that serves for standardizing the modular components for cloud computing processes. In this paper, we use the IVSL(The Iraq Virtual Science Library) to select the free, full-text access to papers from major publishers as well as a large collection of on-line educational materials.


  • Keywords


    Cloud Services; Cloud Computing; Survey.

  • References


      [1] Brototi Mondala,∗, Kousik Dasguptaa, Paramartha Duttab, Load Balancing in Cloud Computing using Stochastic Hill Climbing-A Soft Computing Approach, 2012.

      [2] Abdul Nasir Khana, ∗, M.L. Mat Kiah a, Samee U. Khanb, Sajjad A. Madanic, towards secure mobile cloud computing: A survey, 2012.

      [3] Fa-Chang Chenga, Wen-Hsing Laib*, The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy, 2012.

      [4] Jaeger PT, Lin J, Grimes JM. Cloud computing and information policy: computing in a policy cloud? Journal of InformationTechnology and Politics 2008, 5(3): 269 – 283. http://dx.doi.org/10.1080/19331680802425479.

      [5] Dawei Suna,*, Guiran Changb, Lina Suna and Xingwei Wanga, Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments,2013.

      [6] Jie Tao, Holger Marten; David Kramer, Wolfgang Karl, An Intuitive Framework for Accessing Computing Clouds, 2011.

      [7] Asli Deniz Helvacioglu Kuyucu, the Playground of Cloud Computing in Turkey, 2011.

      [8] Ben Martini*, Kim-Kwang Raymond Choo, An integrated conceptual digital forensic framework for cloud computing, 2012.

      [9] Gaofeng Zhang a, Yun Yanga, Jinjun Chen b, A historical probability based noise generation strategy for privacy protection in cloud computing, 2012.

      [10] Mell P, Grance T. The NIST Definition of Cloud Computing. Communications of the ACM; 2010; 53(6):50.

      [11] Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R. et al. Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009. http://dx.doi.org/10.1145/1655008.1655020.

      [12] Andrzej Goscinski _, Michael Brock, toward dynamic and attribute based publication, discovery and selection for cloud computing, 2010.

      [13] Arnon Rosenthal, Peter Mork *, Maya Hao Li, Jean Stanford, David Koester, Patti Reynolds, and Cloud computing: A new business paradigm for biomedical information sharing, 2009.

      [14] Chang Liu a,∗, Xuyun Zhanga, Chi Yangb, Jinjun Chena, CCBKE — Session key negotiation for fast and secure scheduling of scientific applications in cloud computing.

      [15] Daniele Angeli, Enrico Masala, A cost-effective cloud computing framework for accelerating multimedia communication simulations, 2012.

      [16] Dimitrios Zissis , Dimitrios Lekkas, Securing e-Government and e-Voting with an open cloud computing architecture,2011.

      [17] Dimitrios Zissis ∗, Dimitrios Lekkas, Addressing cloud computing security issues, 2012.

      [18] Huaglory Tianfielda, _, Rainer Unlandb , Towards autonomic computing systems,2012.

      [19] Ismail Ari ⇑, Nitel Muhtaroglu, Design and implementation of a cloud computing service for finite element analysis, 2011.

      [20] K. Jorissen ∗, F.D. Vila, J.J. Rehr, A high performance scientific cloud computing environment for materials Simulations, 2012.

      [21] Laboratoire LICEF, T616-universit6, Universit6 du Qu6becm, Application of Artificial Intelligence Techniques to Computer Network Topology Design, 2012.

      [22] LICEF Laboratory, T&universit~. Giversit& du Q&bee, 1001, rue Sherbrooke Est, 4e Ptage, Case Postale 5250, Succ. C,Mont&al, Q&bec, Canada, H2L 4L5, An artificial intelligence approach for generating assembly sequences in CAD/CAM, 1995.

      [23] M. Mackay a, T. Baker b, A. Al-Yasiri c, Security-oriented cloud computing platform for critical Infrastructures, 2012.

      [24] Md. Tanzim Khorshed, A.B.M. Shawkat Ali ∗, Saleh A. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, 2012.

      [25] Nabil Sultan, Cloud computing for education: A new dawn, 2010.

      [26] Nir Kshetri, Privacy and security issues in cloud computing: The role of institutions and institutional evolution, 2013.

      [27] Niroshinie Fernando ∗, Seng W. Loke ∗, Wenny Rahayu, Mobile cloud computing: A survey, 2013.

      [28] S. Subashini n, V.Kavitha, A survey on security issues in service delivery models of cloud computing, 2012.

      [29] Saurabh Kumar Garg a,∗, Steve Versteeg b, Rajkumar Buyyaa, A framework for ranking of cloud computing services, 2013.

      [30] Sean Marston a, Zhi Li a, Subhajyoti Bandyopadhyay, Juheng Zhang a, Anand Ghalsasi b, Cloud computing — the business perspective, 2011.

      [31] Shun-Sheng Wang, Kuo-Qin Yan *, Shu-Ching Wang, Achieving efficient agreement within a dual-failure cloud-computing environment, 2011.

      [32] Slaven Brumec,NevenVrcˇek, Cost effectiveness of commercial computing clouds, 2012.

      [33] Subhas Chandra Misra ∗, Arka Mondal1, Identification of a company’s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment, 2011.

      [34] R.Buyya, C. Yeo, S.Venugopal, J.Broberg, I.Brandic, Cloud computing and emerging it platforms: Vision, hype, and reality fordelivering computing as the 5th utility, in: Future Generation Computer Systems, vo1.25, 2009, pp. 599–616.http://dx.doi.org/10.1016/j.future.2008.12.001.

      [35] G. Boss, P. Malladi, D. Quan, L. Legregn, Cloud computing, in: High Performance On Demand Solutions (HiPODS), IBM, 2007.

      [36] R. R.Buyya, R.Ranjan, Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services,in: ICA3PP 2010, Part I, LNCS 6081., 2010, pp. 13–31.

      [37] T. R.Armstrong, D.Hensgen, The relative performance of various mapping algorithms is independent of sizable variances in runtimepredictions, in: 7th IEEE Heterogeneous Computing Workshop (HCW ’98), 1998, pp. 79–87.http://dx.doi.org/10.1109/HCW.1998.666547.

      [38] A. Vouk, Cloud computing- issues, research and implementations, in: Information Technology Interfaces, 2008, pp. 31–40.

      [39] Tuncay Ercan, Effective use of cloud computing in educational institutions, 2010.

      [40] Weiwei Lina,*, James Z. Wangb, Chen Liangc, Deyu Qia, A Threshold-based Dynamic Resource Allocation Scheme for Cloud Computing,2012.

      [41] Xun Xu n, from cloud computing to cloud manufacturing.Christine W. Chana,*, Guo H. Huangb, Artificial intelligence for management and control of pollution minimization and mitigation processes, 2012.

      [42] R.N.Calheiros, R. Ranjan, A. Beloglazov, C. Rose, R. Buyya, Cloudsim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, in: Software: Practice and Experience (SPE), Volume 41, Number 1, ISSN: 0038-0644, Wiley Press, New York, USA., 2011, pp. 23–50.

      [43] A.M. Alakeel, A guide to dynamic load balancing in distributed computer systems, in: IJCSNS International Journal of Computer Science and Network Security, VOL.10No.6, 2010, pp. 153–160.

      [44] S. Russell, P. Norvig, Artificial intelligence: A modern approach 3/e, in: Pearson Publication, ISBN-10: 0136042597, 2010.

      [45] Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology 2009.

      [46] Ruiter J, Warnier M. Privacy regulations for cloud computing - compliance and implementation in theory and practice. SPCC 2010.

      [47] Rimal BP, Choi E, Lumb I. A taxonomy and survey of cloud computing systems. International Joint Conference on INC, IMS and IDC 2009, 44 – 51.

      [48] Catteddu D, Hogben G. Cloud computing: benefits, risks and recommendations for information security. Technical Report.European Network and Information Security Agency, 2009.

      [49] Ristenpart T, Tromer E, Shacham H, Savage S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009.http://dx.doi.org/10.1145/1653662.1653687.

      [50] Soghoian, C. Caught in the cloud: privacy, encryption, and government back doors in the Web 2.0 Era, J on Telecomm & High Tech L 2009, 8: 359 – 424.

      [51] Kant K, Iyer R, Mohapatra P. Architectural impact of secure socket layer on Internet servers. Int’l Conf on Computer Design 2000, 7-14.http://dx.doi.org/10.1109/ICCD.2000.878263.

      [52] Gentry C. Fully homomorphic encryption using ideal lattices. ACM Symposium on Theory of Computing 2009, 169–178.http://dx.doi.org/10.1145/1536414.1536440.

      [53] Cooney M. IBM touts encryption innovation. Computer World 2009, June 25.

      [54] Schneier B. Homomorphic encryption breakthrough. Schneier on Security 2009, July 9.

      [55] Pearson S, Shen Y, Mowbray M. A privacy manager for cloud computing. CloudCom 2009.http://dx.doi.org/10.1007/978-3-642-10665-1_9.

      [56] Michael Armbrust, Armando Fox, Rean Griffith and et al. Above the Clouds: A Berkeley View of Cloud Computing [EB/OL], http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html, February 10, 2009.

      [57] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic, Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems, Volume 25, And Number 6, Pages: 599-616, ISSN: 0167-739X, Elsevier Science, Amsterdam, The Netherlands, and June 2009.

      [58] Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal, Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities, Keynote Paper, Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Sept. 25-27, 2008, Dalian, China.

      [59] Xindong You, Xianghua Xu, Jian Wan, Dongjin Yu, "RAS-M: Resource Allocation Strategy Based on Market Mechanism in Cloud Computing," chinagrid, pp.256-263, 2009 Fourth ChinaGrid Annual Conference, 2009.

      [60] Hien Nguyen Van, Frédéric Dang Tran, Jean-Marc Menaud, "SLA-Aware Virtual Resource Management for Cloud Infrastructures," cit, vol. 1, pp.357-362, 2009 Ninth IEEE International Conference on Computer and Information Technology, 2009. http://dx.doi.org/10.1109/CIT.2009.109.

      [61] P radeep Kumar,Vivek Kumar Segal, Durg Singh Chauhan, “Effective Ways of Secure, Private and Trusted Computing”, International Journal of Computer Science Issues (IJCSI), vol8, Issues3,No2,May2011 ,pp412-421.

      [62] Hien Nguyen Van, Frederic Dang Tran, Jean-Marc Menaud, "Autonomic virtual resource management for service hosting platforms," icse-cloud, pp.1-8, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009

      [63] F. Hermenier, X. Lorca, J.-M. Menaud, G. Muller and J. Lawall. Entropy: a Consolidation Manager for Cluster. In proc.of the 2009 International Conferenceon Virtual Execution Environments (VEE’09), Mar.2009.

      [64] Guiyi Wei, Athanasios V. Vasilakos, Yao Zheng and Naixue Xiong. A game-theoretic method of fair resource allocation for cloud computing services. The Journal of Supercomputing,Volume 54, Number 2, 252-269, Nov.2010.http://dx.doi.org/10.1007/s11227-009-0318-1.

      [65] Rodrigo N. Calheiros, Rajiv Ranjan, Cesar A. F. De Rose, and Rajkumar Buyya, “CloudSim: A Novel Framework for modeling and Simulation of Cloud Computing Infrastructures and Services”, 2009.

      [66] Rahul Singh, Upendra Sharma, Emmanuel Cecchet and Prashant Shenoy. Autonomic Mix-Aware Provisioning for Non-Stationary Data Center Workloads, Proceedings of the 7th IEEE International Conference on Autonomic Computing and Communications (ICAC), Washington, DC, USA, June 7-11, 2010.http://dx.doi.org/10.1145/1809049.1809053.

      [67] J. Hellerstein, F. Zhang, and P. Shahabuddin. An Approach to Predictive Detection for Service Management. In Proceedings of the IEEE Intl. Conf. on Systems and Network Management, 1999.http://dx.doi.org/10.1109/INM.1999.770691.

      [68] D. Menasce and F. Ribeiro. In search of invariants for e-business workloads. In Proceedings of the 2nd ACM conference on Electronic Commerce, pages 56–65, 2000.http://dx.doi.org/10.1145/352871.352878.

      [69] Jakarta Apache. JMeter. http://jakarta.apache.org/jmeter/index.html,2010.12.

      [70] H. Lim, S. Babu, J. Chase, and S. Parekh. Automated Control in Cloud Computing: Challenges and Opportunities, 2009.

      [71] Proc. of the First Workshop on Automated Control for Datacenters and Clouds, June 2009:13-18.

      [72] Foster I, Zhao Y, Raicu I, Lu, S. Cloud Computing and Grid Computing 360-degree compared. Proceedings of the GridComputing Environments Workshop, GCE 2008; IEEE Press, Nov. 2008, 1-10.http://dx.doi.org/10.1109/GCE.2008.4738445.

      [73] Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, andreality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009; 25(6):599–616.http://dx.doi.org/10.1016/j.future.2008.12.001.

      [74] Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. AView of Cloud Computing. Communications of the ACM; 2010; 53(4):50–58.http://dx.doi.org/10.1145/1721654.1721672.

      [75] Paquette S, Jaeger P T, Wilson S C. Identifying the security risks associated with governmental use of cloud computing.Government Information Quarterly; 2010;27(3):245–253.http://dx.doi.org/10.1016/j.giq.2010.01.002.

      [76] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network andComputer Applications; 2011; 34(1):1–11.http://dx.doi.org/10.1016/j.jnca.2010.07.006.

      [77] Vaquero L M, Rodero-Merino L, Morán D. Locking the sky: A survey on IaaS cloud security. Computing; 2011; 91(1):93–118.http://dx.doi.org/10.1007/s00607-010-0140-x.

      [78] B. Bazeer Ahamed, S. Syed Sabir Mohamed, “Implementation of Trusted Computing Technologies in Cloud Computing” International Journal of Research and Reviews in Information Sciences(IJRRIS),Vol. 1, No. 1, March 2011.pp 7-9

      [79] Pearson S, Benameur A. Privacy, security and trust issues arising from cloud computing. Proceedings of the 2nd IEEEInternational Conference on Cloud Computing Technology and Science, CloudCom 2010; IEEE Press, Nov. 2010, 693-702.http://dx.doi.org/10.1109/CloudCom.2010.66.

      [80] Ahamed S I, Haque M M, Endadul Hoque M, Rahman F, Talukder N. Design, analysis, and deployment of omnipresentformal trust model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software; 2010; 83 (2):253–270.http://dx.doi.org/10.1016/j.jss.2009.09.040.

      [81] Karaoglanoglou K, Karatza H. Resource discovery in a Grid system: Directing requests to trustworthy virtual organizationsbased on global trust values. Journal of Systems and Software; 2011; 84(3):465–478.http://dx.doi.org/10.1016/j.jss.2010.10.043.

      [82] Takabi H, Joshi J B D, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy; 2010;8(6):24–31.http://dx.doi.org/10.1109/MSP.2010.186.

      [83] Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments.Communications in Computer and Information Science; 2010;54:255–265.http://dx.doi.org/10.1007/978-3-642-12035-0_25.

      [84] Algirdas A, Jean-Claude L, Brian R, Carl L. Basic concepts and taxonomy of dependable and secure computing. IEEETransactions on Dependable and Secure Computing; 2004; 1 (1):11–33.http://dx.doi.org/10.1109/TDSC.2004.2.

      [85] Jason Reid Juan M. González Nieto Ed Dawson, "Privacy and Trusted Computing", Proceedings of the 14th International Workshop on Database and Expert Systems Applications, IEEE, 2003

      [86] Tchifilionova V. Security and privacy implications of cloud computing - Lost in the cloud. Proceedings of the IFIP WG 11.4 International Workshop on Open Research Problems in Network Security, iNetSec 2010; Springer Verlag Press, Mar. 2010, 149-158.

      [87] Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing; 2009; 13 (6):291–399.http://dx.doi.org/10.1007/s00779-008-0212-5.

      [88] Shekarpour S, Katebi S D. Modeling and evaluation of trust with an extension in semantic web. Journal of Web Semantics; 2010; 8(1):26–36.http://dx.doi.org/10.1016/j.websem.2009.11.003.

      [89] Iltaf N, Hussain M, Kamran F. A mathematical approach towards trust based security in pervasive computing environment, 2009.

      [90] Proceedings of the Third International Conference and Workshops, ISA 2009; IEEE Press, Jun. 2009, 702-711.

      [91] H. Kornmayer et al., gEclipse- An Integrated, Grid Enabled Workbench Tool for Grid Application Users, Grid Developers and Grid Operators based on the Eclipse Platform, in: Proceedings of the 2nd Austrian Grid Symposium, Innsbruck, Austria, 2006, project web:http://www.geclipse.eu/.

      [92] Xiao-Yong Li , Li-Tao Zhou ,Yong Shi and Yu Guo, “A trusted computing environment model in cloud architecture”, International Conference on Machine Learning and Cybernetics (ICMLC), July 2010, Volume 6, pp. 2843-2848http://dx.doi.org/10.1109/ICMLC.2010.5580769.

      [93] M. Malawski1, T. Bartynski, M. Bubak, a Tool for Building Collaborative Applications by Invocation of Grid Operations, in: ComputationalScience - ICCS 2008, Vol. 5103 of LNCS, 2008, pp. 243–252.

      [94] OMII-Europe, The OMII-Europe Project, http://www.omii-europe.com/index.html.

      [95] Google, Google App Engine, http://code.google.com/intl/de-DE/appengine/.

      [96] Balakrishnan.S,Saranya.G,Shobana.S,Karthikeyan.S,“Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”. International Journal of Computer Science and Technology Vol. 2, Issue 2, June 2011, pp398-400.

      [97] Microsoft, Windows Azure Platform, http://www.zimory.com/.

      [98] Salesforce, Salesforce Software, http://www.salesforce.com/.

      [99] OpSource Inc., OpSource Cloud, ttps://www.opsourcecloud.net/.

      [100] Zimory, Zimory Public Cloud,http://www.microsoft.com/windowsazure/.

      [101] K. Keahey ET. al., Science Clouds: Early Experiences in Cloud Computing for Scientific Applications, in: Proceedings of CCA-08, 2008.

      [102] L. Wang, J. Tao, M. Kunze, Scientific Cloud Computing: Early Definition and Experience, in: Proceedings of the 2008 International Conferenceon High Performance Computing and Communications (HPCC 2008), 2008, pp. 825–830.http://dx.doi.org/10.1109/HPCC.2008.38.

      [103] D. Nurmi ET. al., The Eucalyptus Open-source Cloud Computing System, in: Proceedings of CCA-08, 2008.

      [104] B. Sotomayor ET. al., Capacity Leasing in Cloud Systems using the OpenNebula Engine, in: Proceedings of CCA-08, 2008.

      [105] P.Wolniewicz et al., Accessing Grid computing resources with g-Eclipse platform, Computational Methods in Science and Technologie 13 (2)(2007) 131–141.http://dx.doi.org/10.12921/cmst.2007.13.02.131-141.

      [106] Hadoop, Apache Hadoop MapReduce, http://hadoop.apache.org/.

      [107] Xuan Zhang Wuwong, N. Hao Li Xuejie Zhang, “Information Security Risk Management Framework for the Cloud Computing Environments” IEEE 10th International Conference Computer and Information Technology (CIT), 2010, pp. 1328 – 1334.


 

View

Download

Article ID: 4564
 
DOI: 10.14419/jacst.v4i1.4564




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.