Cloud Computing: Data Storage Protocols and Security Techniques

Authors

  • R. V. D harmadhikari Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India
  • S. S. Turambekar Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India
  • S. C. Dolli Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India
  • P K Akulwar Computer Science and Engineering, Sanjay Ghodawat Institutes, Shivaji University, Atigre, India

Keywords:

Cloud computing, Virtualization, Data Storage, Security, Architecture

Abstract

Cloud computing has emerged as a new technology for hosting and delivering services over the internet. Cloud computing removes the necessity for users to plan ahead for resource provisioning. So it is appealing for business owners. Using cloud computing enterprises can start off with little resources as needed and later on increase the resources when needed. Cloud computing has made a huge impact in IT industry. However cloud computing is at its developing stages only. Still there are many issues to be considered. In this paper an overview of cloud computing is given. The concepts used in cloud computing is also highlighted. This paper also gives an idea about the data storage security and protocols which are used in cloud computing.

 

References

SurucheeV.Nandagaonkar, A.B Raut, “A Comprehensive Study on Cloud Computing” International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 4, pg. 733-738, April 2014.

http://cloudcomputingnet.com/cloud-computing-architecture/

VikasGoyal, “Review: Layers architecture of cloud computing” International Journal of computing and Business research, Proceedings of „I-Society 2012‟at GKU

https://www.computenext.com/blog/when-to-use-saas-paas-and-iaas/

Qi Zhang, Lu Cheng, RaoufBoutaba, “Cloud computing: state-of-art and research challenges”, Journal of Internet Services and Applications, pg. 7-18, April 2010.

https://www.techopedia.com/definition/26814/virtual-private-cloud-vpc.

http://searchcloudapplications.techtarget.com/definition/virtual-private-cloud-VPC.

http://whatis.techtarget.com/definition/multi-tenancy

Keiko Hashiume, David G Rosado, Eduardo Fernandez-medina, Eduardo B Fernandez, “An Analysis of Security Issues of cloud Computing”, Journal of Internet Services and Applications, vol 4 Issue 5, 2013.

http://searchcloudprovider.techtarget.com/definition/cloud-provisioning

(http://erpbloggers.com/2013/07/the-five-essential-characteristics-of-cloud-computing/)

Mladen A. Vouk, “Cloud Computing – Issues, Research and Implementation”, Journal of Computing and Information Technology, pg 235-246, April 2008.

(http://searchsoa.techtarget.com/definition/service-oriented-architecture)

(http://www.service-architecture.com/articles/web-services/service oriented_architecture_soa_definition.html)

(http://searchservervirtualization.techtarget.com/definition/virtualization)

T. Swathi, K. Srikanth, S. Raghunath Reddy,” Virtualization in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 5, pg. 540-546, May 2014.

B. Ramamurthy, K. Madurai,” Concepts, Technologies and Business Implications” Wipro Chennai, 2010.

(http://searchcloudstorage.techtarget.com/feature/Cloud-storage-architecture-vs-local-storage)

V. Spoorthy.M. Mamatha, B. Santhosh Kumar,” A Survey on Data Storage and Security in Cloud Computing”, International Journal of Computer Science and Mobile Computing, vol, 3 Issue. 6, pg. 306-313, June 2014.

Downloads

Published

2018-04-30

How to Cite

[1]
R. V. D. harmadhikari, S. S. Turambekar, S. C. Dolli, and P. K. Akulwar, “Cloud Computing: Data Storage Protocols and Security Techniques”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 2, pp. 113–118, Apr. 2018.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.