Article Preview
Top1. Introduction
Cloud technology is a rising computing area where amenity of their infrastructure supplied as distinct services provided via internet. Cloud computing is summarized as a set of storage, hardware, networks, interfaces and services which combine to delivery resources as a services. According to Gartner (2019), the market of cloud solutions is assessed to increment 17.5% in 2019 to finish $214300 million, raised from $182400 million out of 2018. Gartner projects expansion and the industry size of the cloud solutions sector in almost three time the rise of IT services till 2022. Cloud technology supplies on demand and metered cost effective services (Zhang et al., 2010) i.e. software, infrastructure and platform as a services. Amazon’s EC2 and S3 (n.d.) services, Microsoft Azure (Chappell, 2008) and Google App Engine (n.d.) are common cloud computing services providing by these leading IT companies.
Figure 1. Key Factors for Cloud Security
There are still staying an assortment of challenges associated with cloud security specifically information security, misuse of solutions, malicious entrant and kind of cyber-attacks in cloud computing. Data protection and access control (Kuyoro et al., 2011) are two major vital problems for cloud service provider. Key factors for cloud security (Morgan & Conboy, 2013) are classified as (see Figure 1) (a) Access control is a methodology or set of rule which allows, denies or limits access to some subject or object . (b) Data security means protecting the database from harmful forces along with the malicious activities of unauthorized hackers or subject. (c) Compliance (d) Availability (e) Governance. there are several issues to access record from cloud: (i) Data owner (DO) has to be constantly online. (ii) Searching cost is so high (iii) Time complexity is high for data accessing. (iv)Multiple jobs allocation and scheduling (v) Data redundancy and integrity. (vi) Data security.
1.1 Cloud Architecture
As stated by NIST (Liu et al., 2011), cloud computing is more recognized toward giving a very clear comprehension of cloud computing solutions. It supply a straight forward taxonomy of assistance models to cloud clients. It outlines four models: private model, public model, community and hybrid model. The NIST definition stipulates a 5 traits that every cloud companies demonstrate: resource pooling, speedy physical property, on demand service, wide network access and various computing services. Figure 2 represents NIST reference design model of cloud computing, which recognize the roles and activities of user.
Figure 2. NIST Reference Design Model of Cloud Computing
NIST (Liu et al., 2011) classify five leading participating characters: Consumer, Provider, Auditor, Broker and Carrier. These core subject have played important role in era of cloud computing:
- 1.
Cloud-Consumer: A client that maintain the relationship between user and provider.
- 2.
Cloud-Provider: Someone is liable for making the support accessible for willing parties.
- 3.
Cloud-Auditor: A group that do independent evaluation of system functionality, cloud security and solutions.
- 4.
Cloud-Broker: A person that handles functionality, the uses and delivery of all solutions of cloud involving customer and the cloud supplier.
- 5.
Cloud-Carrier: An intermediate which offer transportation and the connectivity of cloud solutions from suppliers to customer.