Cloud Computing Issues, Challenges, and Needs: A Survey

Mohammad Aljanabi - Alsalam University College, Baghdad, Iraq and Department of Computer Science, College of Education, Aliraqia University, Baghdad, Iraq
Shams N. Abd-Alwahab - Alsalam University College, Baghdad, Iraq
RD Rohmat Saedudin - School of Industrial Engineering, Telkom University, Bandung, West Java, Indonesia
Hind Raad Ebraheem - Alsalam University College, Baghdad, Iraq
- Defni - Department of Information Technology, Politeknik Negeri Padang, Padang, West Sumatera, Indonesia
Ronal Hadi - Department of Information Technology, Politeknik Negeri Padang, Padang, West Sumatera, Indonesia
Mohd Arfian Ismail - Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.5.3.671

Abstract


Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.

Keywords


Cloud computing; security in cloud; challenges; needs of cloud.

Full Text:

PDF

References


C. Sumner, A. Byers, and M. Shearing, Determining personality traits & privacy concerns from facebook activity, Black Hat Briefings, vol. 11, pp. 197-221, 2011.

T. Alakurt, Adaptation of online privacy concern scale into turkish culture, 2017.

R. Arora, A. Parashar, and C. C. I. Transforming, Secure user data in cloud computing using encryption algorithms, International journal of engineering research and applications, vol. 3, no. 4, pp. 1922-1926, 2013.

O. Kocabas and T. Soyata, Towards privacy-preserving medical cloud computing using homomorphic encryption, in Virtual and Mobile Healthcare: Breakthroughs in Research and Practice: IGI Global, 2020, pp. 93-125.

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications, vol. 34, no. 1, pp. 1-11, 2011.

S. N. Kumar and A. Vajpayee, A survey on secure cloud: security and privacy in cloud computing, American Journal of Systems and Software, vol. 4, no. 1, pp. 14-26, 2016.

Z. Shen and Q. Tong, The security of cloud computing system enabled by trusted computing technology, in Signal Processing Systems (ICSPS), 2010 2nd International Conference on, 2010, vol. 2, pp. V2-11-V2-15: IEEE.

S. Xie, Z. Zheng, W. Chen, J. Wu, H.-N. Dai, and M. Imran, Blockchain for cloud exchange: A survey, Computers & Electrical Engineering, vol. 81, p. 106526, 2020.

T. Wang, Y. Mei, W. Jia, X. Zheng, G. Wang, and M. Xie, Edge-based differential privacy computing for sensor–cloud systems, Journal of Parallel and Distributed Computing, vol. 136, pp. 75-85, 2020.

S. A. Osia et al., A hybrid deep learning architecture for privacy-preserving mobile analytics, IEEE Internet of Things Journal, 2020.

J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, Security and privacy for cloud-based IoT: Challenges, IEEE Communications Magazine, vol. 55, no. 1, pp. 26-33, 2017.

P. Li et al., Multi-key privacy-preserving deep learning in cloud computing, Future Generation Computer Systems, vol. 74, pp. 76-85, 2017.

M. B. Mollah, M. A. K. Azad, and A. Vasilakos, Security and privacy challenges in mobile cloud computing: Survey and way ahead, Journal of Network and Computer Applications, vol. 84, pp. 38-54, 2017.

S. Sharma, K. Chen, and A. Sheth, Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems, IEEE Internet Computing, vol. 22, no. 2, pp. 42-51, 2018.

M. Alsajri, M. A. Ismail, and S. Abdul-Baqi, A review on the recent application of Jaya optimization algorithm, in 2018 1st Annual International Conference on Information and Sciences (AiCIS), 2018, pp. 129-132: IEEE.

S. A.-b. Salman, A.-H. A. Salih, A. H. Ali, M. K. Khaleel, and M. A. Mohammed, A New Model for Iris Classification Based on Naïve Bayes Grid Parameters Optimization. International Journal of Sciences: Basic and Applied Research (IJSBAR) (2018) Volume 40, No 2, pp 150-155.

M. K. Khaleel, M. A. Ismail, U. Yunan, and S. Kasim, Review on Intrusion Detection System Based on The Goal of The Detection System, International Journal of Integrated Engineering, vol. 10, no. 6, 2018.

Z. F. Hussain et al., A new model for iris data set classification based on linear support vector machine parameter's optimization, International Journal of Electrical & Computer Engineering (2088-8708), vol. 10, 2020.

B. Q. Elias, M. Alsajri, P. J. Soh, and A. A. Al-hadi, Design of Flexible Planar Antennas Using Substrate Gap Structure for Surface Wave Reduction, in 2019 22nd International Conference on Control Systems and Computer Science (CSCS), 2019, pp. 453-458: IEEE.

M. A. Mohammed et al., A Focal load balancer based algorithm for task assignment in cloud environment, in 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2018, pp. 1-4: IEEE.

D. Chen and H. Zhao, Data security and privacy protection issues in cloud computing, in 2012 International Conference on Computer Science and Electronics Engineering, 2012, vol. 1, pp. 647-651: IEEE.

P. Mell and T. Grance, The NIST definition of cloud computing, 2011.

E. Knorr and G. Gruman, What cloud computing really means, InfoWorld, vol. 7, pp. 20-20, 2008.

J. Brodkin, Gartner: Seven cloud-computing security risks, Infoworld, vol. 2008, pp. 1-3, 2008.

R. Chow et al., Controlling data in the cloud: outsourcing computation without outsourcing control, in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 85-90: ACM.

F. Zafar et al., A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends, Computers & Security, vol. 65, pp. 29-49, 2017.

M. Ahmadian, F. Plochan, Z. Roessler, and D. C. Marinescu, SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud, International Journal of Information Management, vol. 37, no. 2, pp. 63-74, 2017.

D. Zissis and D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems, vol. 28, no. 3, pp. 583-592, 2012.

T. Wang et al., Fog-based storage technology to fight with cyber threat, Future Generation Computer Systems, vol. 83, pp. 208-218, 2018.

O. Razi, S. Sanyal, M. Raza, S. Sourav, and R. Somkunwar, A survey paper on improving performance and enhancing security by using division and replication of data in cloud, International Journal of Advanced Research in Computer Science, vol. 9, no. 2, 2018.

K. Patel and A. Alabisi, Cloud Computing Security Risks: Identification and Assessment, The Journal of New Business Ideas & Trends, vol. 17, no. 2, pp. 11-19, 2019.

W. I. Yudhistyra, E. M. Risal, I.-s. Raungratanaamporn, and V. Ratanavaraha, Using Big Data Analytics for Decision Making: Analyzing Customer Behavior using Association Rule Mining in a Gold, Silver, and Precious Metal Trading Company in Indonesia, International Journal of Data Science, vol. 1, no. 2, pp. 57-71, 2020.

A. H. Ali, Fuzzy generalized Hebbian algorithm for large-scale intrusion detection system, International Journal of Integrated Engineering, vol. 12, no. 1, pp. 81-90, 2020.

M. Ahmad Dar, Security Architecture for Low Resource Devices in Smart City using Cloud, 2020, smartphone; elliptic curve; smart city; cloud vol. 4, no. 3, p. 4, 2020-09-30 2020.

N. R. Zaynalov, U. K. Narzullaev, A. N. Muhamadiev, I. R. Rahmatullaev, and R. K. Buranov, Combining Invisible Unicode Characters To Hide Information In A Text Document, 2020, vol. 4, no. 3, p. 6, 2020-09-30 2020.

P. Khandare, S. Deokar, and A. Dixit, Improvement of Traditional Protection System in the Existing Hybrid Microgrid with Advanced Intelligent Method, International Journal on Data Science, vol. 1, no. 2, pp. 72-81, 2020.

I. M. Al-Joboury and E. H. Al-Hemiary, “Virtualized Fog Network with Load Balancing for IoT based Fog-to-Cloud,” JOIV : International Journal on Informatics Visualization, vol. 4, no. 3, Jul. 2020.




Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
Published by Department of Information Technology - Politeknik Negeri Padang
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.