You are on page 1of 4

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 4 Issue: 12 284 287


_______________________________________________________________________________________________
Study of Future View of Cloud Computing, Storage Dependency and the
Challenges Exists in Cloud Computing Scenario

Rohit Kumar
Lecturer (Electronic & Communication Engg.)
Govt. Polytechnic College,Sikar(Raj.)

Abstract in todays life hardware technologies and network bandwidth are developing continuously it result in the development
of the internet. For achieving the high reliability we can use low power hosts by using a new concept called cloud computing. But
there are many challenges in cloud computing filed also. Cloud computing is an internet based development filed in which virtual
resources are used and it is dynamically scalable. In this paper we focus on the various challenges occurred in cloud computing.

Keywords-.Hardware technology, rliabilitye, cloud computing, challenges

__________________________________________________*****_________________________________________________

I. INTRODUCTION
Cloud computing is a big word in distributing computing
industries. Some people arise the question that cloud computing
is going to change the IT industry. So for this we have to first
understand what is cloud computing? How it is different from
grid computing and service-oriented computing? What are the
main issue and challenges for the cloud computing user and
provides? For answering these questions in this paper we focus
on different challenges arise in cloud computing [1].

A digital network like WAN, internet etc is connected for


accessing the multiple server based resources. For solving the
problem of wide data access, from anywhere there is a solution
called cloud computing. Cloud users may access the server
resources using a computer, note book, pad computer, smart Figure 1.1: Cloud Computing senario
phone, or other device. In cloud computing, applications are
provided and managed by the cloud server and data is also Figure 1.1 give the brief knowledge about cloud computing.
stored remotely in the cloud configuration. There is no need for The advantagesof the cloud computing is given below:
user to download and install applications on their own device 1. It Cloud coputing provides multiple soloutions of the
or computer; all processing and storage is maintained by the data usages
cloud server. The on-line services may be offered from a cloud 2. It give the facilities of atomatic backup
provider or by a private organization [7]. 3. It is very flexible. We can set the environment
according to the requirement
4. Modern based integration, cloud computing
environment also focus on the latest technologies and
trends.
5. It has the benifities of automatic updates
6. We can access moblile and web from anywhere.

284
IJRITCC | Month 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 12 284 287
_______________________________________________________________________________________________
II. FEATURES OF CLOUD COMPUTING cloud computing. To solve this problem this paper propose an
efficient data encryption to encrypt sensitive data before
Cloud storage and cloud computing are different terms.
sending to the cloud server.
Cloud storage is used to store the data and cloud computing is
related to do the digital tasks. Instead of using remote server Hanumantha Rao et al. [12] have defined a business model for
storage space alone, we are using processing power to get cloud computing for data providing the security using data
something done. Cloud computing is basically use for large encryption and decryption algorithms. In this method cloud
amount of data rather than a small data. So it is beneficial for service provider has responsible for data storage and data
business than individuals. encryption/decryption tasks, which takes more computational
overhead for process of data in cloud server.
In most cloud computing applications, data is sent to remote
processors via the Internet, the process is completed, and the Swati Paliwal et al. [13] discuss a new approach called
resulting data is sent back. A frequent example is SaaS or Attribute Based Encryption (ABE). And it is proposed a
Software as a Service, where you use a software interface but verified data decryption method to get security for data. They
the bulk of software activity is carried out remotely instead of have been designed the data decryption algorithm based on the
by your own computer [8]. user requested attributes of the out sourced encrypted data.
There are many features of cloud computing exists. Some
ShivShakti et al. in [14] proposed the performance of six
of them are as follows: different symmetric key RSA data encryption algorithms in
1. Server Management: server management is a key cloud computing environment. This paper discusses two
feature of cloud computing. Cloud computing requires separate cloud servers; one for data server and other for key
vast banks and excilent server management. Its no cloud server and the data encryption and decryption process at
wonder that companies like Amazon have had great the client side.
success in offering servers for basic cloud computing
J.Srivivasi et al. [15] describes Cloud Computing is a versatile
activities, ideal for small businesses. Larger companies
and useful technology that can use to support a broad-
may prefer cloud computing that uses a more spectrum of applications. In this paper, explore the different
specialized cloud hosting provider or their own servers. concepts included in cloud computing. Cloud computing is not
2. Processing Power: While cloud storage focuses on only application oriented but service oriented, it offers on
hard drive space, cloud computing is all about demand virtualized resources as measurable and billable
processing power. Cloud computing may not require as ulitilities.
much hard drive space, but it does need robust
processors to keep applications running smoothly. IV. CHALLENGES OF CLOUD COMPUTING
3. Virtualization Capabilities: Virtualization assign to
There are many challenges in cloud computing filed. Some
many different processes that allow software to control
of them are describe below:
hardware, often at a distance. The name comes from
the ability to create virtual spaces on servers for 1. Security and Privacy
software, data management, desktops, and more. They Security is the first challenge in the cloud computing filed.
look and act like the real thing, but they are digital Because security in the cloud computing is manage through
constructs. This is a foundational concept for cloud third party and assurance much like in traditional outsourcing
computing, and allows for some impressive approaches arrangements. There are many additional challenges with this
to IT management. security challenge. Because many cloud computing users make
4. Targeted to Specific Business Needs: Cloud their own proprietary standards and security technologies, and
computing tends to have limited focus than cloud implement differing security models, which need to be
storage. Most cloud computing explore to offer specific evaluated on their own merits. In a vendor cloud model, it is
solutions for businesses, like marketing capabilities, ultimately down to use customer organizations to ensure that
data processing, and so on [8]. security in the cloud meets their own security polices through
requirements gathering provider risk assessments, due
III. LITERATURE SURVEY ( CHALLENGES OF CLOUD diligence, and assurance activities (CPNI Security Briefing,
COMPUTING) [16] 2010). So it is expected that the organizations which faces the
P. Garbacki et al. [10] describes how to solve the problem of security challenges want the same cloud services. There exist
data security. In this paper fully homomorphism encryption some internal and external threats presents and it need to risk
algorithm, the new type of data security solution to the reduction or risk acceptance [2].
insecurity of the cloud computing is proposed.
2. Service Delivery and Billing
Prakash G L et al. [11] discuss to secure and protect sensitive The second challenge in cloud computing industry is
data. Because it is becomes a major data security challenge in service delivery and billing. It is quite difficult to fix the costs

285
IJRITCC | Month 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 12 284 287
_______________________________________________________________________________________________
of the services because of the on demand nature of the services. to create an open interoperable ecosystem, avoiding
Assessment of the cost and budgeting is very difficult till vendor lock-in, mostly at this initial stage of the
customer provides some good and gives some offers. Both market.
provider and user set the agreement but service level agreement
Usability Challenges: how to use the store data on
of the provider is not satisfactory guaranteed. So business
cloud? It is a big challenge in the context of usability
cannot switch to cloud without a forceful service provider of cloud data. Many different government agencies
guarantee [3]. support the creation of legal framework for
international data protection and they provide the
3. Data Disposal privacy of that data. And the existing cloud services
Cloud service provider generally provides data storage and for and middle ware can improve their services through
this they offer service objectives or guarantees of that data. the help of these agencies.
Service providers give facilities to store large amount of data.
To achieve this service providers keep many copies of that
Cultural Challenges: for providing the better result it
data. If customer wants to delete some data then according to
is very important to take a look about user educations,
industry standards the customer can request to delete the
knowledge and experience. It helps to spread the
particular data. The cloud architecture specifically limits the
benefits of the cloud. . Public procurement should
involvement of the media. Media stores the data and the data
support the adoption of cloud, open standards and
owner can mandate the use of data sanitization techniques. The
open source.
customer should always check their data properly before they
send data on cloud environment [2].

4. Data management
Large data management is a very big challenge in the cloud
computing field because there is continuously increasing the
data of the applications so there is a problem to store the vast
amount of data in the main memory. As a solution of this
problem the database researches find the cloud computing
techniques. It is cost effective and it can make a scalable
parallel data management system. Which can provides the large
amount of data to millions of users. Main objective of this topic
is to give the description about the data management challenges
and opportunities to store data in cloud computing [4]. Figure 1.2 : Technology, Usability and cultural challenges
[6]
5. Reliability
If a user store his/ her data on cloud then there is a big
challenge for the providers to keep their data safe and reliable. V. RESEARCH ISSUES IN CLOUD COMPUTING
In terms of reliability, it all comes down to picking a There are some Challenging research issues in cloud
provider that is reputable and proven. Understanding the computing are given below [9]:
Service Level Agreement (SLA) is crucial as some providers S.No. Challenges Description
guarantee a 100% network uptime rate and reimburse users for 1. Service Level Cloud computing is based on
any downtime. Whats important is that users try services Agreements service level agreement. It is
before they commit. That way, if there are affected components (SLAs) administrative by SLA. It is a big
challenge for the cloud users to
within the operation of the cloud service or a server is lost, you evaluate SLAs cloud vendors.
can rest assured that the right support will be there to manage 2. Interoperability When data is exchange between
and compensate for any issues [5]. two users there required following
a particular standard of cloud. It is
known as cloud interoperability. It
Apart of above basis there are some more challenges are are is very difficult to set a particular
given below: standard for the communication or
Figure 1.1 shows the technology, usability and cultural data exchange between two
parties.
challenges
3. Reliability & Reliability and availability of the
Availability of resources are very important.
Technology Challenge. For getting the new Service Resources should be available
technologies which give the better result many when is needed and it should be
companies and funding agencies support financially. reliable.
There is a big challenge to generate innovative better
4. Cloud Data It is difficult to manage big data in
consequences. It should provide innovative and fast
Management & a systematic manner. And provide
results. In this context, open-source is very important Security security for that data.
286
IJRITCC | Month 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 12 284 287
_______________________________________________________________________________________________
challenges for proving the safe and secure cloud computing
5. Multitenancy There are many applications are services.
available on internet that can use
by the customers. For application- VII. REFERENCES:
layer multi-tenancy specifically,
resources are shared at each [1] Tharam Dillon , Chen Wu and Elizabeth Chang, "Cloud
infrastructure layer and have valid Computing: Issues and Challenges", 2010 24th IEEE
security and performance International Conference on Advanced Information Networking
concerns and Applications.
6. Access Controls Who will access the data? It is big [2] Jaydip Sen, "Security and Security andPrivacy Privacy Privacy
question in cloud computing Issues in Cloud Computing", Innovation Labs, Tata Consultancy
environment. So authentication Services Ltd., Kolkata, INDIA.
and identity management is big [3] http://cloudtweaks.com/2012/08/top-five-challenges-of-cloud-
issue in cloud computing.
computing/.
7. Data Encryption For providing the data security [4] http://link.springer.com/chapter/10.1007%2F978-3-642-29035-
encryption technique can be used. 0_30
It is a key technology for data [5] Nigel Beighton, By Rackspace, "What are the five most
security. Encrypt particular
common challenges new cloud customers have".
secrete data and then decrypt that
data in a secure manner, is a very [6] http://blog.cloudplan.org/2011/10/critical-components-of-
big challenge. government.html
[7] http://www.gazonindia.com/cloud_computing.html
8. Energy it is a key challenge to achieve a
Management good trade-off between energy [8] http://www.gadgetreview.com/cloud-storage-vs-cloud-
saving and application computing-which-are-you-using.
performance. [9] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra
Satapathy, "Cloud Computing: Security Issues and Research
9. Migration of Virtualization can provide
virtual Machines significant benefits in cloud Challenges", IJCSITS, Vol. 1, No. 2, December 2011.
computing by enabling virtual [10] P. Garbacki and V. K. Naik(2007) Efficient Resource
machine migration to balance load virtualization and sharing strategies for heterogeneous Grid
across the data centre. environments, inProc. IFIP/IEEE IMSymp., pp. 4049.
10. Platform Cloud computing environment
Management provide different types of [11] Prakash G L National Institute of Standards and
platforms for programmers and Technology(2009), The NIST Definition of Cloud Computing,
developers. It is a big challenge to Information Technology Laboratory.
set the platform according to the [12] Hanumantha Rao.Galli etc(2013 October).Data security in
requirement. Different names are
cloud using hybrid encryption and decryption International
used for this kind of platform
today, including on-demand journal of advanced research in computer science and software
platform and platform as a service engineering vol3.
(PaaS). An operating system will [13] Swati Paliwal, Ravindra Gupta(2013 February ),A Review of
support applications to run on that Some Popular Encryption Techniques,International Journal of
particular platform.
Advanced Research in Computer Science and Software
11. Server As the resources are increased
Consolidation their required to manage the Engineering,Volume 3, Issue 2, ISSN: 2277 128X
server consolidation. [14] ShivShakti etc(2013 January-Febuary).Encryption using
12. Common Cloud Security based accreditation for different techniques:A Review international journal in
Standards Cloud Computing would cover Multidisciplinary and academic research (SSIJMAR) vol.2 No.1
three main areas which are - (ISSN 2278-5973)
technology, personnel and
operations. It is very necessary to [15] J.Srinivas, K.Venkata Subba Reddy, Dr.A.Moiz Qyser(2012 july
set all the common perspective. )Cloud Computing Basics International Journal of Advanced
And work according to that Research in Computer and Communication Engineering ,Vol. 1,
standards. Issue.
[16] Jagjit Singh, Er. Gurjit Singh Bhathal, "A Review on Storage
Security Challenges in Cloud Computing", IJARCSSE, Volume
VI. CONCLUSION 5, Issue 6, June 2015.

This paper describes the challenges faces in cloud


computing environment. Cloud computing is a rapidly growing
topic in the internet filed. As it is being wide it has many

287
IJRITCC | Month 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________

You might also like