Conceptual oriented study on the cloud computing architecture for the full-security

  • Authors

    • Dr. K.Sai Manoj Amrita Sai Institute of Science and Technology
    • Ms. K.Mrudula Amrita Sai Institute of Science and Technology
    • G Maanasa Amrita Sai Institute of Science and Technology
    • K Phani Srinivas Amrita Sai Institute of Science and Technology
    2018-09-24
    https://doi.org/10.14419/ijet.v7i4.11654
  • Cloud Computing, Security Infrastructure, Cloud Computing Architectures, Enforcing Security among Cloud Computing Systems.
  • Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is un-dertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system.

    In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities

     

     

  • References

      1. [1] Gerald Kaefer, Cloud Computing Architecture, Corporate Research and Technologies, Munich Germany, fourth Generation Data centre IEEE Spectrum,1-9, 2010.

        [2] DejunWang,an Efficient Cloud Storage Model for Heterogeneous Cloud Infrastructures, JOURNAL, 1877-7058/10.1016, 510-515,2011.

        [3] Rajkumar Buyya1,2, Saurabh Kumar Garg1, and Rodrigo N. Calheiros, SLA-Oriented Resource Provisioning for Cloud Computing:Challenges, Architecture and Solutions,2011 International Conference on Cloud and Service Computing,1-10,2011.

        [4] Bhaskar Prasad RimalAdmelaJukan ·DimitriosKatsaros · Yves Goeleven, Architectural Requirements for Cloud Computing, JOURNAL/10.1007/DOI 10.1007/s10723-010-9171-y,1-26,2011.

        [5] Kun Liua, Long-jiang Donga,"Research on Cloud Data Storage Technology and Its Architecture Implementation",JOURNAL/1877-7058/10.1016,133-137,2012.

        [6] Yuri Demchenko, Canh Ngo, Marc X. Makkes, Rudolf Strijkers, 1Cees de Laat, Defining Inter-Cloud Architecture for Interoperability and Integration, CLOUD COMPUTING 2012: The Third International Conference on Cloud Computing, GRIDs, and Virtualization,ISBN: 978-1-61208-216-5,1-7,2012.

        [7] DemekeGebresenbetBayyou member IEEE1, Dr. Menchita F. Dumlao, Cloud Computing Reference Architecture from Different Vendors Perspective, International Journal of Emerging Technology and Advanced Engineering,Vol:3/Issue:11,1-7,2013.

        [8] RajkumarBuyya , Rodrigo N. Calheiros , Jungmin Son , Amir VahidDastjerdi , and Young Yoony, Software-Defined Cloud Computing: Architectural Elements and Open Challenges,3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI) ,1-12,2014.

        [9] A Survey on Protection of Multimedia Content in Cloud Computing Dr. K.Sai Manoj1, Mrudula Kudaravalli2, K Phani Srinivas3International Journal of Computer Science and Mobile ComputiVol.6 Issue.11, November- 2017, pg. 7-11.

  • Downloads

  • How to Cite

    K.Sai Manoj, D., K.Mrudula, M., Maanasa, G., & Phani Srinivas, K. (2018). Conceptual oriented study on the cloud computing architecture for the full-security. International Journal of Engineering & Technology, 7(4), 2491-2493. https://doi.org/10.14419/ijet.v7i4.11654