Cloud Computing Features, Issues and Challenges: A Big Picture

被引:132
作者
Puthal, Deepak [1 ]
Sahoo, B. P. S. [2 ]
Mishra, Sambit [3 ]
Swain, Satyabrata [3 ]
机构
[1] Natl Inst Technol Silchar, Dept Comp Sci & Engn, Silchar, India
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
[3] Natl Inst Technol Rourkela, Dept Comp Sci & Engn, Rourkela, India
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE) | 2015年
关键词
Cloud computing; Cloud security; Virtualization; Workflow scheduling; Data integrity; Public auditing; INFRASTRUCTURE;
D O I
10.1109/CINE.2015.31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the phenomenon of cloud computing was proposed, there is an unceasing interest for research across the globe. Cloud computing has been seen as unitary of the technology that poses the next-generation computing revolution and rapidly becomes the hottest topic in the field of IT. This fast move towards Cloud computing has fuelled concerns on a fundamental point for the success of information systems, communication, virtualization, data availability and integrity, public auditing, scientific application, and information security. Therefore, cloud computing research has attracted tremendous interest in recent years. In this paper, we aim to precise the current open challenges and issues of Cloud computing. We have discussed the paper in three-fold: first we discuss the cloud computing architecture and the numerous services it offered. Secondly we highlight several security issues in cloud computing based on its service layer. Then we identify several open challenges from the Cloud computing adoption perspective and its future implications. Finally, we highlight the available platforms in the current era for cloud research and development.
引用
收藏
页码:116 / 123
页数:8
相关论文
共 40 条
[1]   Deadline-constrained workflow scheduling algorithms for Infrastructure as a Service Clouds [J].
Abrishami, Saeid ;
Naghibzadeh, Mahmoud ;
Epema, Dick H. J. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :158-169
[2]  
[Anonymous], CLOUD SECURITY ALLIA
[3]  
[Anonymous], 2009, NIST DEFINITION CLOU
[4]  
[Anonymous], INT C AV REL SEC
[5]  
[Anonymous], ACM WORKSH SEC WEB S
[6]  
[Anonymous], 6 INT C WIR COMM NET
[7]  
[Anonymous], COMPUTERS SECURITY
[8]  
[Anonymous], 24 IEEE INT C ADV IN
[9]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[10]  
Bennett C., 2010, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, P145, DOI DOI 10.1145/1835804.1835826