Research Journal of Applied Sciences

Year: 2014
Volume: 9
Issue: 9
Page No. 614 - 618

Cloud Computing: Concept, Terminologies, Issues, Recent Technologies

Authors : Saurabh Bilgaiyan, Santwana Sagnika and Sonali Swetapadma Sahu

References

Ahmed, M., A.S.R. Chowdhury, M. Ahmed and M.H. Rafee, 2012. An advanced survey on cloud computing and state-of-the-art research issues. Int. J. Comput. Sci. Issues, 9: 201-207.
Direct Link  |  

Almorsy, M., J. Grundy and A.S. Ibrahim, 2011. Collaboration-based cloud computing security management framework. Proceedings of the 4th IEEE International Conference on Cloud Computing, July 4-9, 2011, Washington, DC., pp: 364-371.

Bilgaiyan, S., S. Sagnika and M. Das, 2014. An analysis of task scheduling in cloud computing using evolutionary and swarm-based algorithms. Int. J. Comput. Appl., 89: 11-18.
CrossRef  |  Direct Link  |  

Bilgaiyan, S., S. Sagnika and M. Das, 2014. Workflow scheduling in cloud computing environment using cat swarm optimization. Proceedings of the 4th IEEE International Advance Computing Conference, February 21-22, 2014, Gurgaon, India, pp: 680-685.

Bisong, A. and S.S.M. Rahman, 2011. An overview of the security concerns in enterprise cloud computing. Int. J. Network Secur. Applic., 3: 30-45.
CrossRef  |  Direct Link  |  

Buyya, R., C.S. Yeo, S. Venugopal, J. Broberg and I. Brandic, 2009. Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst., 25: 599-616.
CrossRef  |  Direct Link  |  

Chaisiri, S., B.S. Lee and D. Niyato, 2012. Optimization of resource provisioning cost in cloud computing. IEEE Trans. Serv. Comput., 5: 164-177.
CrossRef  |  Direct Link  |  

Chen, D. and H. Zhao, 2012. Data security and privacy protection issues in cloud computing. Proceedings of the IEEE International Conference on Computer Science and Electronics Engineering, March 23-25, 2012, Hangzhou, China, pp: 647-651.

Garg, S.K., S. Versteeg and R. Buyya, 2013. A framework for ranking of cloud computing services. Future Gener. Comput. Syst., 29: 1012-1023.
CrossRef  |  Direct Link  |  

Hamlen, K., M. Kantarcioglu, L. Khan and B. Thuraisingham, 2010. Security issues for cloud computing. Int. J. Inform. Secur. Privacy, 4: 39-51.
CrossRef  |  Direct Link  |  

Hashizume, K., D.G. Rosado, E. Fernandez-Medina and E.B. Fernandez, 2013. An analysis of security issues for cloud computing. J. Internet Services Applic. 10.1186/1869-0238-4-5

Hu, J., J. Gu, G. Sun and T. Zhao, 2010. A scheduling strategy on load balancing of virtual machine resources in cloud computing environment. Proceedings of the 3rd International Symposium on Parallel Architectures, Algorithms and Programming, December 18-20, 2010, Dalian, China, pp: 89-96.

Jain, A. and U.S. Pandey, 2013. Role of cloud computing in higher education. Int. J. Adv. Res. Comput. Sci. Software Eng., 2: 966-972.
Direct Link  |  

Jansen, W.A., 2011. Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences, January 4-7, 2011, Koloa, Kauai, HI., USA., pp: 1-10.

Jorissen, K., F.D. Vila and J.J. Rehr, 2012. A high performance scientific cloud computing environment for materials simulations. Comput. Phys. Commun., 183: 1911-1919.
Direct Link  |  

Kulkarni, G., R. Sutar and J. Gambhir, 2012. Cloud computing-infrastructure as service-amazon EC2. Int. J. Eng. Res. Appl., 2: 117-125.

Kumar, P. and S. Anand, 2013. An approach to optimize workflow scheduling for cloud computing environment. J. Theoret. Applied Inform. Technol., 57: 617-623.
Direct Link  |  

Lee, K., 2012. Security threats in cloud computing environments. Int. J. Secur. Appl., 6: 25-32.
Direct Link  |  

Pfeiffer, M., 2014. Implementing active directory domain services in the AWS cloud. Amazon Web Services, March 2014, pp: 1-23. https://d0.awsstatic.com/whitepapers/Implementing_Active_Directory_Domain_Services_in_the_AWS_Cloud.pdf.

Ramgovind, S., M.M. Eloff and E. Smith, 2010. The management of security in Cloud computing. Proceedings of the Information Security for South Africa, August 2-4, 2010, Sandton, Johannesburg, pp: 1-7.

Rimal, B.P., E. Choi and I. Lumb, 2009. A taxonomy and survey of cloud computing systems. Proceedings of the 5th International Joint Conference on INC, IMS and IDC, August 25-27, 2009, Seoul, South Korea, pp: 44-51.

Ristov, S., M. Gusev and M. Kostoska, 2012. Cloud computing security in business information systems. Int. J. Network Secur. Appl., 4: 75-93.
Direct Link  |  

Sabahi, F., 2011. Cloud computing security threats and responses. Proceedings of the 3rd IEEE International Conference on Communication Software and Networks, May 27-29, 2011, Xian, China, pp: 245-249.

Tayal, S., 2011. Tasks scheduling optimization for the cloud computing system. Int. J. Innov. Eng. Technol., 5: 111-115.
Direct Link  |  

Vouk, M.A., 2008. Cloud computing-issues, research and implementations. J. Comput. Inform. Technol., 16: 235-246.
Direct Link  |  

Warneke, D. and O. Kao, 2011. Exploiting dynamic resource allocation for efficient parallel data processing in the cloud. IEEE Trans. Parallel Distrib. Syst., 22: 985-997.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved