Security In Cloud Computing Opportunities And Challenges PdfBy Morgan M. In and pdf 25.03.2021 at 16:36 9 min read
File Name: security in cloud computing opportunities and challenges .zip
Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
- Opportunities and Challenges of Cloud Computing to Improve Health Care Services
- A survey on security challenges in cloud computing: issues, threats, and solutions
- Cloud computing in the real world: The challenges and opportunities of multicloud
Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects management, technology, security, and legal to evaluate the opportunities and challenges of this computing model.
Opportunities and Challenges of Cloud Computing to Improve Health Care Services
Despite the considerable benefits of cloud computing environments, there are some serious concerns that have affected the reliability and efficiency of this modern and ongoing concept . Numerous challenging issues face cloud computing and have attracted the attention of many researchers and service providers. Hence, the most important challenges and issues in cloud computing environments have been classified and reviewed in this paper to provide a better understanding of the vision of cloud computing and the challenges ahead for further researches.
Each of these issues has affected the reliability and efficiency of cloudbased environments regarding to their concepts. Data Management and Resource AllocationOne of the most important concepts in cloud computing data centers is resource allocation. The importance of this concept is specified according to the large number of resources in cloud-based environments.
Accordingly, resource allocation process should fulfill network quality of service requirements, eliminate performance hiccups without significant enhancement of service provider cost, and manage energy consumption . Challenges in resource allocations are classified into three major parts: data center network resources, data center processing resources, and energy efficient data center resource allocation.
The first part focuses on scheduling resources according to user requests. Therefore, the computational throughput in cloud-based data center should be as minimized as possible  and the distance between the locations of virtual machines in cloud data center should be decreased by distributing virtual machines .
The most challenging issue in data center network resources is optimizing virtual network provisioning while maximizing the revenue. Moreover, the process of selecting the most appropriate virtual network with IP over the cloud-based network is a considerable issue that has been considered regarding to propagation, delay, and flow conversion constant .
Furthermore, establishment of an energy efficient data center resource allocation is an exigent requirement in cloudbased data centers for minimizing power consumption in cloud data centers or reducing number of used servers by amalgamating tasks and virtual machines on the minimized number of servers. Security and PrivacyOne of the most challenging issues that decrease the rate of reliability and efficiency in cloud computing environments is ensuring the security and privacy of stored resources.
Cloud computing security has become an important topic in industry and academic research and has become the leading cause of impeding its development . Typically, security issues in cloud-based environments have been divided  to three main parts: vulnerability to attack, standard security practices and being subject to state or national data-storage laws related to privacy or record keeping.
These issues led to the appearance of considerable concerns in various levels i. Hence, more detailed security concerns have been shown in table 1 with reference to defined levels. According to table 1, user authentication and access control processes are the most challenging issues in cloud-based environments, which cause the appearance of notable concerns in both levels of service providers and end-users.
Therefore, many studies and researches have been performed to improve the efficiency and reliability of managing accesses and authentications, but there has been a slight increase in the results of these researches in comparison with the rapid growth of cloud computing communications.
Applying agent-based authentication system  and multifactor authentication process  are two common solutions for increasing the reliability of authentication process. Furthermore, ensuring the security of resources during transmission processes between providers and tenants is a challenging issue that is considered by researchers and service providers.
The other important security issue is the ability of resistance in cloud-based servers against possible attacks or unpredictable events. A significant resistance may improve the process of data protection by service providers and enhance the rate of reliability in cloud computing environments. Applying real-time cryptography algorithms may be the most appropriate solution for enhancement of resistance against possible attacks or unpredictable events .
Load BalancingLoad balancing is an important issue in cloud computing environment that is related to storage utilization and download performance. The main objective in this case is to establish an algorithm for assigning tasks to the cloud nodes effectively according to exiting limitations  e.
Typically, challenges and issues related to load balancing in cloud computing environments are classified to four major parts : spatial distribution of the cloud nodes, data replication, performance, and point of failure. The first issue is the way of managing load balancing process between all spatially distributed cloud nodes. This management should consider several delays that can possibly happen because of the distance between clients and task processing nodes, speed of the network links between cloud nodes, and the distance between service nodes .
The second problem is the way the data is replicated i. The next issue is related to the performance of load balancing algorithm. Due to the nature of load balancing processes, the complexity of the designed algorithm should be as less as possible to avoid faults and delays during intricate processes. The last challenge is the ability of resistance in load balancing algorithms against usual or unpredictable failures. Using a controller function to manage and minimize failures due to the increasing complexity of load balancing algorithms is a challenging issue in cloud based environments that attracts researchers' considerations.
Scalability and AvailabilityThe ability of adapting cloud capacity to on-demand services during occurrence of various workloads i. The lack of this ability may cause performance degradation in the peak of workload or even oversizing in the bottom of workload during the provision of on-demand services . Elastic resource scaling is the most appropriate solution against possible workloads in cloud computing environment to make resource provisioning more flexible in comparison with static scaling and decrease the dependency of this process on workload predictions .
The difference between elastic and static resource scaling has been shown in Fig. According to Fig. This type of scaling has a significant weakness against once-in-alifetime and unpredictable workloads and may cause system failure during resource provisioning when experienced workload is more than predicted workload.
Apart from that, in elastic resource scaling Fig. Moreover, the process of provisioning is terminated regardless of reaching the predicted workload peak. Elastic resource scaling can handle all types of workload. However, the complexity of elastic resource scaling algorithms may decrease the performance of resource provisioning processes especially during unpredicted workloads.
Migration to Clouds and CompatibilityThe rapid growth and the popularity of cloud computing between users and enterprises has encouraged traditional IT providers to move and adapt their products e. However, the possibility of success in this migration process is a challenging issue due to the existing limitations in traditional IT products.
The process of migration involves four main steps. In the first step components should be evaluated regarding scalability requirements and the rate of their dependency on persistence related functionality.
Furthermore, the orchestration of system should be investigated in the second steps to meet appropriate interaction requirements between various components in virtual or physical nodes. In the third step, components that could not meet sufficient scalability requirements should be identified and be re-factored by decomposing to smaller components. Finally, the compatibility and adaptation of components against various cloud computing environments i. Migration to cloud-based services has considerable benefit for users and enterprises such as enhancing the rate of satisfaction in work, providing proper opportunities for organizational growth and new skills development, and declining monotonous work.
Nevertheless, there are some important concerns during the process of migration such as increasing dependency of enterprises on external third party, departmental downsizing, lack of understanding about cloud features and structure, lack of supporting resources, and uncertainty in new technology . Hence, all possibilities and highlights should be considered by enterprises and providers during the process of migration and after that.
Interoperability and Communication Between CloudsThe lack of interoperability between various cloud vendors is an important issue that has happened due to disparate approaches and structure between them. This deficiency may happen in different level of cloudbased environments e. Each level of interoperability has some drawbacks that makes the process of achieving interoperable cloud computing environments more challengeable.
Despite these considerable benefits, there are serious concerns and challenges about this new technology. The most important issue is related to security and privacy subjects in cloud-based environments. Furthermore, resource allocation, load balancing, data management, data availability, scalability, compatibility and interoperability are the other challenges in cloud-based environments that decrease efficiency and reliability of this technology.
Accordingly, challenges and concerns related to cloudbased environments have been identified and most appropriate current solutions for each challenge have been described. In Overall, it is anticipated that cloud computing will be the most important and challenging issue in IT industry. As regarding the importance of this technology, we hope this paper will contribute to a better understanding of the vision of cloud computing and the challenges ahead for further researches.
Related Papers. Muni Lavanya. By Rajiv Ranjan. By hari kisjsnn. Handbook of Cloud Computing. By Dr. Anuj Gupta. By aida hakemi. Download pdf. Remember me on this computer.
Enter the email address you signed up with and we'll email you a reset link. Need an account? Click here to sign up.
A survey on security challenges in cloud computing: issues, threats, and solutions
What can enterprise businesses do to reap the benefits of cloud technology while ensuring a secure environment for sensitive information? Recognizing those challenges is the first step to finding solutions that work. In our technology driven world, security in the cloud is an issue that should be discussed from the board level all the way down to new employees. As more and more businesses and operations move to the cloud, cloud providers are becoming a bigger target for malicious attacks. Distributed denial of service DDoS attacks are more common than ever before. Verisign reported IT services, cloud platforms PaaS and SaaS was the most frequently targeted industry during the first quarter of
The migration of user's assets (data, applications etc.) outside the administrative control in a shared environment where numerous users are collocated escalates the security concerns. This survey details the security issues that arise due to the very nature of cloud computing. Cloud security challenges.
Cloud computing in the real world: The challenges and opportunities of multicloud
Cloud computing has gained huge attention over the past decades because of continuously increasing demands. There are several advantages to organizations moving toward cloud-based data storage solutions. These include simplified IT infrastructure and management, remote access from effectively anywhere in the world with a stable Internet connection and the cost efficiencies that cloud computing can bring. The associated security and privacy challenges in cloud require further exploration. Researchers from academia, industry, and standards organizations have provided potential solutions to these challenges in the previously published studies.
Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. DOI:
More companies than ever are using multiple cloud providers.
Opportunities and Challenges of Cloud Computing to Improve Health Care Services
Стратмор замолчал, словно боясь сказать что-то, о чем ему придется пожалеть. Наконец он поднял голову: - ТРАНСТЕКСТ наткнулся на нечто непостижимое. - Он опять замолчал. Сьюзан ждала продолжения, но его не последовало. - Больше трех часов. Стратмор кивнул. Она не выглядела взволнованной.
Он опустил руку и отвернулся, а повернувшись к ней снова, увидел, что она смотрит куда-то поверх его плеча, на стену. Там, в темноте, ярко сияла клавиатура. Стратмор проследил за ее взглядом и нахмурился Он надеялся, что Сьюзан не заметит эту контрольную панель. Эта светящаяся клавиатура управляла его личным лифтом. Стратмор и его высокопоставленные посетители попадали в шифровалку и уходили незаметно для остальных сотрудников.
Купол из плексигласа имел ячеистую структуру - защитную паутину, способную выдержать взрыв силой в две мегатонны. Солнечные лучи, проходя сквозь этот экран, покрывали стены нежным кружевным узором. Крошечные частички пыли, пленницы мощной системы деионизации купола, простодушно устремлялись вверх широкой спиралью. Наклонные стены помещения, образуя вверху широкую арку, на уровне глаз были практически вертикальными. Затем они приобретали как бы полупрозрачность, завершаясь у пола непроницаемой чернотой - посверкивающей черной глазурью кафеля, отливавшей жутковатым сиянием, создававшим какое-то тревожное ощущение прозрачности пола. Черный лед.
Ускоренное проигрывание видеозаписи придавало изображению некоторую комичность. Вот Танкадо вышел на открытое место и залюбовался открывшимся перед ним зрелищем. Он козырьком поднес руку к глазам и стал разглядывать шпили над внушительным фасадом. - Смотрите внимательно, - предупредил Смит. - Халохот - профессионал.
Двухцветный задумался и развел руками. - Каким рейсом она летит. - Она сказала, колымагой.
В нашем распоряжении будет целых два дня. - Но я уже забронировала номер, обиженно сказала Сьюзан. - Нашу старую комнату в Стоун-Мэнор. - Я понимаю, но… - Сегодня у нас особый день - мы собирались отметить шесть месяцев.
Начиная с этого момента его связь с Халохотом стала не только мгновенной, но и абсолютно неотслеживаемой. Первое послание, которое он отправил Халохоту, не оставляло места сомнениям, тем более что они это уже обсуждали: убить Энсея Танкадо и захватить пароль. Стратмор никогда не спрашивал у Халохота, как тот творил свои чудеса: тот просто каким-то образом повторял их снова и. Энсей Танкадо мертв, власти убеждены, что это сердечный приступ, прямо как в учебнике, кроме одного обстоятельства. Халохот ошибся с местом действия.
Меган, - сказал он печально. - Я полагаю, что у вашей подруги есть и фамилия. Беккер шумно вздохнул. Разумеется. Но мне она неизвестна.
Это где-то здесь, - пробормотала она, вглядываясь в текст. - Стратмор обошел фильтры. Я в этом уверена.
ГЛАВА 54 - Пусти. А потом раздался нечеловеческий крик.