eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35,  Peer-reviewed, Open-access Journal

A News Letter Sign UP!
The adoption of cloud computing: Problems and Solutions

Open Access

International Journal of Latest Research in Science and Technology Vol.12 Issue 1, pp 1-5,Year 2023

THE ADOPTION OF CLOUD COMPUTING: PROBLEMS AND SOLUTIONS

Sergio Rafael García Bravo*, Miguel Patiño Ortiz, Tonáhtiu Arturo Ramírez Romero

Received : 10 May 2023; Accepted : 28 May 2023 ; Published : 01 June 2023

Share
Download 0
View 0
Article No. 11034
Abstract

This document presents a general overview of the main risks and problems in cloud-computing security that the information owners face, as well as a showing of the common tools and solutions that help reduce these problems and guarantee security, confidentiality and information integrity. Finally, an architecture of the solution is proposed.

Key Words   
Cloud computing, migration, security problems, attacks, solutions, cypher tools.
Copyright
References
  1. Kelf S. (2020). The security risks created by cloud migration and how to overcome them. Network Security (2020) 14-16.
  2. Mai R., Tamer A., Rasha I. (2019). Integrity and Confidentiality in Cloud Outsourced Data. Ain Shams Engineering Journal, 10, 275-285.
  3. Amron M.T., Ibrahim R., Bakar N.A.A., Chuprat S. (2019). Determining Factors Influencing the Acceptance of Cloud Computing Implementation. The Fifth Information Systems International Conference 2019, Procedia Computer Science 161 (2019) 1055-1063.
  4. Akinrolabu O., Nurse J.R.C., Marton A., New S. (2019). Cyber Risk Assessment in Cloud Provider Environments: Current Models and Future Needs. Computer & Security 87 (2019) 101600.
  5. Ali Kh. E., Mazen Sh. A., Hassanein E. E. (2018). A Proposed Hybrid Model for Adopting Cloud Computing in e-Government. Future Computing and Informatics Journal 3 (2018) 286-295.
  6. Subashini S., Kavitha V. (2011). A survey on security issues in service delivery models for cloud computing. Journal of Network and Computer Applications, 11, 1 – 11.
  7. Di Giulio C., Sprabery R., Kamhoua C., Kwiat K., Campbell R., Bashir M. (2017). Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security. ACM ICC ´17, March 22 2017, Cambridge, United Kingdom. ACM 978-1-4503-4774-7/17/03.
  8. Kumar P.R., Raj P.H., Jelciana P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science 125 (2018) 691-697.
  9. ShaluMall, Saroj S.K. (2018). A New Security Framework for Cloud Data. 8th International Conference on Advances in Computing and Communication (ICACC-2018), Procedia Computer Science 143 (2018) 765-775.
  10. Ferrer J., Farràs O., Ribes-Gonzalez J., Sánchez D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications 140-141 (2019) 38-60.
  11. Somani G., Singh Gaur M., Sanghi D., Conti M., Buyya R. (2017). DDoS Attacks in Cloud Computing: Issues, taxonomy, and future Directions. Computer Communications 107 (2017) 30-48.
  12. Maniah, Abdurachman E., Lumban Gaol F., Soewito B. (2019). Survey on Threats and Risks in Cloud Computing Environment. Procedia Computer Science 161 (2019) 1325-1332.
  13. Zhao E M., Geng Y. (2019). Homomorphic Encryption Technology for Cloud Computing. Procedia Computer Science 154 (2019) 73-83.
  14. Alaya B., Laouamer L., Msilini N. (2020). Homomorphic encryption system statement: Trends and Challenges. Computer Science Review 36 (2020) 100235 1-14.
  15. Potey M., Dhote C.A., Sharma D.H. (2016). Homomorphic Encryption for Security of Cloud Data. 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79 (2016) 175-181.
  16. Zhang J., Yang Y., Chen Y., Chen J., Zhang Q. (2017). A General Framework to Design Secure Cloud Storage Protocol Using Homomorphic Encryption Scheme. Computer Networks 129: 37 – 50.
  17. Souza S M P C., Puttini R S. (2016). Client-side encryption for privacy-sensitive applications on the Cloud. Procedia Computer Science 97 (2016) 126 – 130.
  18. Hawedi M., Talhi C., Boucheneb H. (2018). Security as a Service for Public Cloud Tenants (SaaS). Procedia Computer Science 130 (2018) 1025-1030.
  19. Copil G., Moldovan D., Truong H.L., Dustdar S. (2014). On Crontolling Cloud Services Elasticity In Heterogeneous Clouds. IEEE 7th International Conference on Utility and Cloud Computing.
To cite this article

Sergio Rafael García Bravo*, Miguel Patiño Ortiz, Tonáhtiu Arturo Ramírez Romero , " The Adoption Of Cloud Computing: Problems And Solutions ", International Journal of Latest Research in Science and Technology . Vol. 12, Issue 1, pp 1-5 , 2023


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.