SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2064
Legacy and Privacy Issues in Cloud Computing
Anurag Chandna, 2Yashveer Singh2, Sagar Choudhary3
1,2,3Assistant Professor, Department of Computer Science and Engineering, Roorkee College of Engineering,
Roorkee, Uttarakhand, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Clouding Computing is popular nowadays. It is
like the on-demand availability of computer system resources
like data storage and computing program or application,
information or multimedia content, or elements for
multimedia information sharing. Allthesedataorinformation
is available to different user with the help of internet. The
cloud computing architecture in which third party users,
virtual machine and cloud service provider are involved for
data uploading and downloading with the help of internet.
Legacy and privacy of the cloud is very important concerns of
nowadays as more and more clients usingthecloud forstoring
their data and information. As now mobile and computer is
increasing in numbers, result the numbers of attackers is also
increasing. The main concern of legacy is to provide the legal
data to the client and privacy should be maintain on this data
is also very important.
Key Words: Cloud Computing, Legacy, Privacy, DoS,
Security, User, ID, Server Authentication
1. INTRODUCTION
Cloud computing is the on-demand delivery of IT resources
like data or information, over the Internet with pay-as-you-
go pricing. Instead of buying, owning, and maintaining
physical data centers and servers for personal or business
use, you can access technology services, such as computing
power, storage, and databases, on an as-needed basis froma
cloud provider with a very high speed data rate.[1] Cloud
computing has two meanings. The most common approach
to running workloads remotely and with the help very high-
speed data communication overtheinternetinacommercial
provider’s data center, also known as the “public cloud”
model. Popular publiccloudofferings—suchasAmazon Web
Services (AWS), Google Cloud, Salesforce’s CRM system, and
Microsoft Azure—all exemplify this familiar notion of cloud
computing. Today, most businesses take a multi-
cloud approach, which simplymeanstheyusemorethan one
public cloud service.[2]
The second meaning of cloud computing describes how it
works: a virtualized pool of resources, from raw compute
power to application functionality, available on demand by
the cloud service provider like Google, Amazon, Microsoft
etc. When customers or clients procure cloud services, the
cloud service provider fulfills those requestsusingadvanced
automation rather than manual provisioning. The key
advantage is agility: the ability to apply abstracted compute,
storage, and network resources to workloads as neededand
tap into an abundance of prebuilt services. [2]
But, probably, the most widespreadtodayistheonegivenby
Mell and Grance in [3]; Cloud computing is “a model for
enabling convenient, on-demand network access to a shared
pool of configurable computing resources that can be rapidly
provisioned and released with minimal management effort or
service provider interaction”. The Gartner's special report by
Smith in [4] says in its very opening statement: “cloud
computing is maturing, but it continues to be the latest, most
hyped concept in IT”.
Infrastructure as a Service (IaaS)
IaaS contains the basic building blocks forcloudInformation
Technology and data sharing with the authenticate
customer. It typically provides access to networking
features, computers (virtual or on dedicated hardware),and
data storage space. IaaS gives you the highest level of
flexibility of cloud data and information and management
control over your IT resources like data and information
shared with each other or access this informationforfurther
manipulation. It is most like the existing IT resources with
which many IT departments and developers are familiar. [1]
Platform as a Service (PaaS)
PaaS removes the need for you to manage underlying
infrastructure (usually hardware and operating systems)
and allows you to focus on the deploymentand management
of your applications. This helps you be more efficient as you
don’t need to worry about thesoftware, websitedesigningor
coding, resource procurement, capacity planning, software
maintenance, patching, or any of the other software
requirement or undifferentiated heavy lifting involved in
running your application for cloud computing. [1]
Software as a Service (SaaS)
SaaS provides you with a complete product that is run and
managed by the service provider. In most cases, people
referring to SaaS are referringto end-userapplications(such
as web-based email). [1]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2065
Figure 1: Service Model of Cloud Computing
2. DEPLOYMENT MODELS
Cloud Computing architecture consists of four deployment
models, and, on top of the deployment models, restthe three
main service delivery models, as illustrated in Figure 2.Each
of these models brings about different security, legacy and
privacy challenges that need to be taken into consideration
when planning to move business processes, data and
information to the cloud, for the betterment of the cloudand
business:
Figure 2: NIST Cloud Computing Model [6]
Organizations planning to adopt Cloud Computing services
can choose from four main deployment models. First thing
that we need to take care, there is the private cloud also
known as internal cloud; the infrastructure is operated
solely for an organization. It is managed by the organization
or a third party and may be some of internal online or offline
support. Usually, big organizations with multiple sites
implement this model to service their office locations that
might be scattered across the globe. At the other extreme,
there is the public cloud also known as externalcloudmodel,
It is available to the general public or a large industry group
and is owned by an large or medium level organization
offering cloud services for a fee or free, as per the cloud
service provider policy. A public cloud is hosted, operated
and managed by a third-party vendor from oneormoredata
centers[7]. The community cloud modelisshared bymultiple
organizations that have a common objective and supports a
specific community that has shared concerns such as
mission, security requirements, policy and compliance
considerations. It may be managed by the organizationor by
an assigned third party. The hybrid cloud model is a
composition of two or more clouds (private, community or
public) that remain unique entities, but are bound together
by standardized or proprietary technologythatenablesdata
and application portability [8].
Cloud Computing services are generally delivered through
three main delivery models to the end‐user, as illustrated in
Figure 2. SaaS is a software distribution model in which
applications are hosted by a vendor or service provider, and
made available to customers over a network, typically the
internet. SaaS has emerged as the dominant delivery model
and an underlying technology that supports web services
and service-oriented architecture (SOA). The SaaS model is
associated with the pay‐as‐you‐go subscription licensing
model. North Bridge [9] identifies SaaS as the leading model,
with a 63% share of the market, while according to the
Yankee Survey (2010)[10], PaaS and IaaS are taking longer to
develop. Some of the major players in this area are IBM
Lotus Live, Google Apps, Oracle, Facebook, Netsuite and
Salesforce.com.PaaSprovidesthedevelopmentenvironment
and it rests on top of Infrastructure‐as‐a‐Service(IaaS).PaaS
delivers operating systems and associated services over the
internet, without the need to download or install
applicationsonend‐usercomputers.Itprovidesanoperating
environment for delivering a variety of applications and is
essentially an outgrowth of the SaaS application delivery
model. Sub‐types of PaaS include Desktop‐as‐a‐Service
(DTaaS) and Testing‐as‐a‐Service (TaaS). Vendors in this
area include Amazon Web Services, Google App Engine,
Windows Azure Platform, Force.com and Caspio.
IaaS provides the entireinfrastructurestackthatdeliversthe
computer infrastructure, and it leverages significant
technology, services, and data centre investments, todeliver
IT as a service to customers. IaaS differs from SaaS in that,
instead of software, IaaS delivers hardware such as servers,
memory, CPUs, disk space and networkconnectivity.Service
providers in thismodelincludeFlexiscale,Rightscale,Gogrid,
Amazon Web Services and Cisco Unified Service Delivery.
IaaS is the fastest growing model and is expectedtogive way
to PaaS in five years’ time.
Cloud Computing Inhibitors
There several barriers to Cloud Computing adoption [6]
identify the following: security, privacy, connectivity and
open access, reliability, interoperability, independencefrom
cloud service providers (CSP), economic value, IT
governance, changes in the IT organisation, and political
issues due to global boundaries. Other Cloud Computing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2066
adoption problems in developing economies for SMBs are
the following: poor basic infrastructure, access to ICT
devices, poor internet coverage and geographicallocation of
cloud data.
3. PRIVACY OF CLOUD COMPUTING
Privacy of cloud is very important factor for cloud
infrastructure. There are many laws and regulations for
maintaining the privacy of data and information.
Compliance refers to an organization’s responsibility to
operate in agreement with established laws, regulations,
standards, and specifications. Various types of security and
privacy laws and regulations exist within differentcountries
at the national, state, and local levels, making compliance a
potentially complicated issue for cloud computing. For
example, at the end of 2010, the NationalConferenceofState
Legislatures reported that forty-six states have enacted
legislation governing disclosure of security breaches of
personal information, and that at least twenty-nine states
have enacted laws governing the disposal of personal data
held by businesses and/or government.
3.1 Law and Regulations
For U.S. Federal agencies, the major security and privacy
compliance concerns include the Clinger-Cohen Act of1996,
the Office of Management and Budget (OMB) Circular No. A-
130, particularly Appendix III, the Privacy Act of
1974, the E-Government Act of 2002 and its accompanying
OMB guidance, and the Federal Information Security
Management Act (FISMA) of 2002.11 Also of importanceare
National Archives and Records Administration (NARA)
statutes, including the Federal Records Act (44 U.S.C.
Chapters 21, 29, 31, 33) and NARA regulations (Title 36 of
the Code of Federal Regulations, Chapter XII, Subchapter B).
The Privacy Act governs the collection, maintenance, use,
and dissemination of information about individuals that is
maintained in systemsofrecordsbyfederalagenciesand can
be retrieved by a personal identifier (e.g., name). It requires
each agency to publish notice of its systems of records (i.e.,a
system of records notice (SORN))in theFederalRegisterand
to allow individuals to request access to and correction of
their records and information. The E-Government Act of
2002, among other things, requires federal agencies to
complete a Privacy Impact Assessment (PIA) on all new or
substantially changed technology that collects,maintains,or
disseminates PII, and to make the results publicly available.
M-03-22, OMB Guidance for Implementing the Privacy
Provisions of the E-Government Act of 2002, provides
direction to agencies on conducting PIAs. A PIA is a
structured review of an information system to identify and
mitigate privacy risks, including risks to confidentiality, at
every stage of the system lifecycle. It can also serve as a tool
for individuals working on a program or accessing a system
to understand how to best integrate privacy protections
when working with PII.
3.2 Data Privacy
Privacy is the ability of an individual or group to seclude
themselves or information about themselves and thereby
reveal them selectively. Privacy has the following elements.
(i) When: a subject may be more concerned about the
current or future information being revealed than
information from the past.
(ii) How: a user may be comfortable if his/her friends
can manually request his/her information, but the
user may not like alerts to be sent automatically and
frequently.
(iii) Extent: a user may rather have his/her information
reported as an ambiguous region rather than a
precise point.
In commerce, consumer's context and privacy need to be
protected and used appropriately. In organizations, privacy
entails the application of laws, mechanisms, standards, and
processes by which personally identifiable information is
managed.
In the cloud, the privacy meanswhenusersvisitthesensitive
data, the cloud services can prevent potential adversary
from inferring the user's behavior by the user's visit model
(not direct data leakage). Researchers have focused on
Oblivious RAM (ORAM) technology. ORAM technology visits
several copies of data to hide the real visiting aims of users.
ORAM has been widely used in software protection and has
been used in protecting the privacy in the cloud as a
promising technology. Stefanov et al. proposed that a path
ORAM algorithm is state-of-the-art implementation.
The privacy issues differ according to different cloud
scenarios and can be divided into four subcategories as
follows:
(i) how to enable users to have control over their data
when the data are stored and processed in cloud and
avoid theft, nefarious use, and unauthorized resale,
(ii) how to guarantee data replications in a jurisdiction
and consistent state, where replicating user data to
multiple suitable locations is a usual choice, and
avoid data loss, leakage, and unauthorized
modification or fabrication,
(iii) which party is responsible for ensuring legal
requirements for personal information?
(iv) to what extent cloud subcontractors are involved in
processing which can be properly identified,
checked, and ascertained.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2067
4. LEGACY
Legacy systems are software solutions found in a company
for a long period of time [7]. The systems have probably
survived in a company because of the software maintenance
(corrective, preventive, and evolutionary), internal
resistance to technology changes, or they may run critical
processes. Usually, these kinds of systems work in isolation
and with an exclusive data repository (i.e. data files,
databases, etc.). Therefore, the communication between the
legacy systems to other newer application is a hard task and
it requires the definition of complex communication
interfacesanddataconversioncomponents.Additionally,the
companies with old legacy systems need to invest money to
integrate theirs tools, to adapt functionality to new
technologies, and to make flexible their business processes.
Most of the companies firstly transform the traditional
applications to software based on SOA before adopting the
Cloud paradigm, because SOA is flexible to services
composition and it encapsulates the business logic through
web services (WSs). Those WSscancommunicate eachother
by standard protocols and methods of message exchanging,
which facilitate the services composition. The SOA
applications consist basically of three layers: (a)
Presentation Layer: where is the user interface;(b)Business
Layer: where are the business logic and its functionality
implemented by algorithms, software components or WSs;
and (c) Data Layer: where is the schema and application
data. The applications can be migrated by layers. A
conceptual model of system migration toCloudComputingis
presented in Fig. 1). It is considered in the migration model
the following techniques:
• Application Replacement: it entails replacing the whole
application or part of it for one or more standard
components available in the market. As a result, some
configurations and adaptation task must be conducted as
part of the system migration. This replacement cangenerate
the loss of information control, the need of creating new
interfaces withothercomponentsorapplications,thechange
of the normal workflow in the organization, and the lack of
information about the internal structure of the acquired
components.
• Application Conversion: it consists in transforming the
whole application in a Cloud Computing solution. The
transformation can be conducted automatically using a
conversion engine that also maps the converted data, but it
is necessary that the legacy system works normalized and
without failures. ─ Software Conversion: it is the
transformation of algorithms and software applications,
keeping their functionalityandtheirstructures, butchanging
some programming aspects. ─ Data Conversion: it is the
transformation of data according to a specific target schema
or format. ─ Schema Conversion: it is the transformation of
the data structure to a new equivalent structure ofdatabase.
• Application Virtualization: it basically involves the
generation of virtual system container, and all system
components and data schema are moved into the container
without changing the source code. The legacy system is
considered as a black box, within which all layers are
encapsulated. During the users’ interaction, all the
inputs/outputs are analyzed to generate a “wrapper” that is
the nexus between the encapsulated legacy system and the
new presentation layer deployed in Cloud Computing.
5. CONCLUSIONS
In the cloud architecture, some malicious nodesmayjoin the
network which is responsible to trigger zombie attack inthe
network. These zombie nodes can spoof the information of
the legitimate user and communicate with virtual machine
on the behalf of legitimate user. This will lead toreductionin
network performance in terms of delay and bandwidth
consumption. As cloud computing faces various security
issues which lead to the exposure of confidential data of
users. These security issues make users unstable about the
efficiency, safety and reliability in cloud computing.
In this review paper, we presented NICE to protect cloud
virtual networking environment from DDoS attack. NICE
construct attack graph predicts the nextstepoftheattackers
and provides optimized countermeasure. NICE software
switches implement the countermeasure against zombie
explorative attack dynamically. To improve the detection
accuracy, NICE are needed to be implement in distributed
fashion. The proposed solution can reduce the risk of cloud
system being misused by internal and external attack. The
experimental results show less amount of CPU utilization
and better success measure rate of traffic load.
6. ACKNOWLEDGEMENT
Authors would like to thank Roorkee College ofEngineering,
Roorkee, Dist-Haridwar, Uttarakhand, India.
7. REFERENCES
[1] https://aws.amazon.com/what-is-cloud-computing/
[2] https://www.infoworld.com/article/2683784/what-is-
cloud-computing.html
[3] NIST, The NIST Definition of Cloud Computing, P. Mell
and T. Grance, Editors. 2009, National Institute of
Standards and Technology.
[4] Smith, D.M., Hype Cycle for Cloud Computing, in Gartner
Research Report. 2011. p. 9-11.
[5] S. Choudhary, G. Pundir, Y. Singh, Detection and Isolation
of Zombie Attack under Cloud Computing, in
International Research Journal of Engineering and
Technology (IRJET). Vol – 7, Issue-01, Jan 2020. p. 1419-
1424.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2068
[6] Winkler, V. J. R. (2011). Securing the cloud: Cloud
computer security techniques and tactics. Waltham, MA:
Syngress.
[7] Mather, T., Kumaraswamy, S. & Latif, S. (2009). Cloud
security and privacy: An enterprise perspective on risks
and compliance. Sebastopol, CA: O'Reilly Media, Inc.
[8] Mell, P. & Grance, T. (2011). The NIST definition of cloud
computing, National Institute of Standards and
Technology. NIST Special Publication, 800‐145.
[9] North Bridge. (2013). Future of Cloud Computing Survey
2013. Retrieved November 12, 2013, from North Bridge
website:
http://www.northbridge.com/2013‐cloud‐computing‐su
rvey.
[10] Yankee Survey. (2010).TheAnywhereEnterprise:2010
U.S. Cloud Computing FastView Survey. Retrieved
November 12, 2013, from Yankee Group website:
http://www.yankeegroup.com/about_us/press_releases
/2010‐08‐23.html.
[11]Yunchuan Sun, Junsheng Zhang, Yongping
Xiong, Guangyu Zhu, International Journal of Distributed
Sensor Networks, Volume: 10 issue: 7,July 2014,
https://journals.sagepub.com/doi/pdf/10.1155/2014/1
90903
[12] Zalazar, Ana & Gonnet, Silvio & Leone, Horacio. (2015).
Migration of Legacy Systems to Cloud Computing.
Electronic Journal of SADIO. 14.
8. BIOGRAPHIES
Anurag Chandna completed his
M.C.A. and Master of Technology
(M.Tech). He published more than
15 International journals and
attends many conferences in
reputed institute and university.
Dr. Yashveer Singh completedhis
Master of Technology (M.Tech) in
2011 and Doctorate of philosophy
(Ph.D) in 2016. He published more
than 15 International journals and
attends many conferences in
reputed institute and university.
Sagar Choudhary graduated from
Uttarakhand Technical University,
Dehradun, India (B.Tech-I.T.) in
2011 and received his Master’s
from Uttarakhand Technical
University, Dehradun, India
(M.Tech-C.S.E.) in 2014. Currently
he is working in RoorkeeCollegeof
Engineering as Assistant Professor
in the department of Computer
Science and Engineering. His area
of interest are wireless networks
and cloud computing.

More Related Content

What's hot

Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderIRJET Journal
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingcloudresearcher
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and SolutionIRJET Journal
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds EMC
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...AIRCC Publishing Corporation
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Cloud Computing in Health
Cloud Computing in HealthCloud Computing in Health
Cloud Computing in HealthJuan Bru
 
Idc unified-infrastructure
Idc unified-infrastructureIdc unified-infrastructure
Idc unified-infrastructureCMR WORLD TECH
 
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSBENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSijccsa
 

What's hot (15)

Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds  Analyst Report: Clearing the Clouds
Analyst Report: Clearing the Clouds
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperab...
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Cloud Computing in Health
Cloud Computing in HealthCloud Computing in Health
Cloud Computing in Health
 
Idc unified-infrastructure
Idc unified-infrastructureIdc unified-infrastructure
Idc unified-infrastructure
 
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESSBENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
 

Similar to Legacy and Privacy Issues in Cloud Computing

A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingIRJET Journal
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudSourabh Saxena
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...IRJET Journal
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudAlgorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudIRJET Journal
 
Enterprise Cloud Analytics
Enterprise Cloud AnalyticsEnterprise Cloud Analytics
Enterprise Cloud Analyticsiosrjce
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - CloudSonovate
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 

Similar to Legacy and Privacy Issues in Cloud Computing (20)

A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloud
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
 
G017324043
G017324043G017324043
G017324043
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
The Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing EssayThe Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing Essay
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
A017620123
A017620123A017620123
A017620123
 
Algorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in CloudAlgorithm for Scheduling of Dependent Task in Cloud
Algorithm for Scheduling of Dependent Task in Cloud
 
Enterprise Cloud Analytics
Enterprise Cloud AnalyticsEnterprise Cloud Analytics
Enterprise Cloud Analytics
 
C017341216
C017341216C017341216
C017341216
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Legacy and Privacy Issues in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2064 Legacy and Privacy Issues in Cloud Computing Anurag Chandna, 2Yashveer Singh2, Sagar Choudhary3 1,2,3Assistant Professor, Department of Computer Science and Engineering, Roorkee College of Engineering, Roorkee, Uttarakhand, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Clouding Computing is popular nowadays. It is like the on-demand availability of computer system resources like data storage and computing program or application, information or multimedia content, or elements for multimedia information sharing. Allthesedataorinformation is available to different user with the help of internet. The cloud computing architecture in which third party users, virtual machine and cloud service provider are involved for data uploading and downloading with the help of internet. Legacy and privacy of the cloud is very important concerns of nowadays as more and more clients usingthecloud forstoring their data and information. As now mobile and computer is increasing in numbers, result the numbers of attackers is also increasing. The main concern of legacy is to provide the legal data to the client and privacy should be maintain on this data is also very important. Key Words: Cloud Computing, Legacy, Privacy, DoS, Security, User, ID, Server Authentication 1. INTRODUCTION Cloud computing is the on-demand delivery of IT resources like data or information, over the Internet with pay-as-you- go pricing. Instead of buying, owning, and maintaining physical data centers and servers for personal or business use, you can access technology services, such as computing power, storage, and databases, on an as-needed basis froma cloud provider with a very high speed data rate.[1] Cloud computing has two meanings. The most common approach to running workloads remotely and with the help very high- speed data communication overtheinternetinacommercial provider’s data center, also known as the “public cloud” model. Popular publiccloudofferings—suchasAmazon Web Services (AWS), Google Cloud, Salesforce’s CRM system, and Microsoft Azure—all exemplify this familiar notion of cloud computing. Today, most businesses take a multi- cloud approach, which simplymeanstheyusemorethan one public cloud service.[2] The second meaning of cloud computing describes how it works: a virtualized pool of resources, from raw compute power to application functionality, available on demand by the cloud service provider like Google, Amazon, Microsoft etc. When customers or clients procure cloud services, the cloud service provider fulfills those requestsusingadvanced automation rather than manual provisioning. The key advantage is agility: the ability to apply abstracted compute, storage, and network resources to workloads as neededand tap into an abundance of prebuilt services. [2] But, probably, the most widespreadtodayistheonegivenby Mell and Grance in [3]; Cloud computing is “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction”. The Gartner's special report by Smith in [4] says in its very opening statement: “cloud computing is maturing, but it continues to be the latest, most hyped concept in IT”. Infrastructure as a Service (IaaS) IaaS contains the basic building blocks forcloudInformation Technology and data sharing with the authenticate customer. It typically provides access to networking features, computers (virtual or on dedicated hardware),and data storage space. IaaS gives you the highest level of flexibility of cloud data and information and management control over your IT resources like data and information shared with each other or access this informationforfurther manipulation. It is most like the existing IT resources with which many IT departments and developers are familiar. [1] Platform as a Service (PaaS) PaaS removes the need for you to manage underlying infrastructure (usually hardware and operating systems) and allows you to focus on the deploymentand management of your applications. This helps you be more efficient as you don’t need to worry about thesoftware, websitedesigningor coding, resource procurement, capacity planning, software maintenance, patching, or any of the other software requirement or undifferentiated heavy lifting involved in running your application for cloud computing. [1] Software as a Service (SaaS) SaaS provides you with a complete product that is run and managed by the service provider. In most cases, people referring to SaaS are referringto end-userapplications(such as web-based email). [1]
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2065 Figure 1: Service Model of Cloud Computing 2. DEPLOYMENT MODELS Cloud Computing architecture consists of four deployment models, and, on top of the deployment models, restthe three main service delivery models, as illustrated in Figure 2.Each of these models brings about different security, legacy and privacy challenges that need to be taken into consideration when planning to move business processes, data and information to the cloud, for the betterment of the cloudand business: Figure 2: NIST Cloud Computing Model [6] Organizations planning to adopt Cloud Computing services can choose from four main deployment models. First thing that we need to take care, there is the private cloud also known as internal cloud; the infrastructure is operated solely for an organization. It is managed by the organization or a third party and may be some of internal online or offline support. Usually, big organizations with multiple sites implement this model to service their office locations that might be scattered across the globe. At the other extreme, there is the public cloud also known as externalcloudmodel, It is available to the general public or a large industry group and is owned by an large or medium level organization offering cloud services for a fee or free, as per the cloud service provider policy. A public cloud is hosted, operated and managed by a third-party vendor from oneormoredata centers[7]. The community cloud modelisshared bymultiple organizations that have a common objective and supports a specific community that has shared concerns such as mission, security requirements, policy and compliance considerations. It may be managed by the organizationor by an assigned third party. The hybrid cloud model is a composition of two or more clouds (private, community or public) that remain unique entities, but are bound together by standardized or proprietary technologythatenablesdata and application portability [8]. Cloud Computing services are generally delivered through three main delivery models to the end‐user, as illustrated in Figure 2. SaaS is a software distribution model in which applications are hosted by a vendor or service provider, and made available to customers over a network, typically the internet. SaaS has emerged as the dominant delivery model and an underlying technology that supports web services and service-oriented architecture (SOA). The SaaS model is associated with the pay‐as‐you‐go subscription licensing model. North Bridge [9] identifies SaaS as the leading model, with a 63% share of the market, while according to the Yankee Survey (2010)[10], PaaS and IaaS are taking longer to develop. Some of the major players in this area are IBM Lotus Live, Google Apps, Oracle, Facebook, Netsuite and Salesforce.com.PaaSprovidesthedevelopmentenvironment and it rests on top of Infrastructure‐as‐a‐Service(IaaS).PaaS delivers operating systems and associated services over the internet, without the need to download or install applicationsonend‐usercomputers.Itprovidesanoperating environment for delivering a variety of applications and is essentially an outgrowth of the SaaS application delivery model. Sub‐types of PaaS include Desktop‐as‐a‐Service (DTaaS) and Testing‐as‐a‐Service (TaaS). Vendors in this area include Amazon Web Services, Google App Engine, Windows Azure Platform, Force.com and Caspio. IaaS provides the entireinfrastructurestackthatdeliversthe computer infrastructure, and it leverages significant technology, services, and data centre investments, todeliver IT as a service to customers. IaaS differs from SaaS in that, instead of software, IaaS delivers hardware such as servers, memory, CPUs, disk space and networkconnectivity.Service providers in thismodelincludeFlexiscale,Rightscale,Gogrid, Amazon Web Services and Cisco Unified Service Delivery. IaaS is the fastest growing model and is expectedtogive way to PaaS in five years’ time. Cloud Computing Inhibitors There several barriers to Cloud Computing adoption [6] identify the following: security, privacy, connectivity and open access, reliability, interoperability, independencefrom cloud service providers (CSP), economic value, IT governance, changes in the IT organisation, and political issues due to global boundaries. Other Cloud Computing
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2066 adoption problems in developing economies for SMBs are the following: poor basic infrastructure, access to ICT devices, poor internet coverage and geographicallocation of cloud data. 3. PRIVACY OF CLOUD COMPUTING Privacy of cloud is very important factor for cloud infrastructure. There are many laws and regulations for maintaining the privacy of data and information. Compliance refers to an organization’s responsibility to operate in agreement with established laws, regulations, standards, and specifications. Various types of security and privacy laws and regulations exist within differentcountries at the national, state, and local levels, making compliance a potentially complicated issue for cloud computing. For example, at the end of 2010, the NationalConferenceofState Legislatures reported that forty-six states have enacted legislation governing disclosure of security breaches of personal information, and that at least twenty-nine states have enacted laws governing the disposal of personal data held by businesses and/or government. 3.1 Law and Regulations For U.S. Federal agencies, the major security and privacy compliance concerns include the Clinger-Cohen Act of1996, the Office of Management and Budget (OMB) Circular No. A- 130, particularly Appendix III, the Privacy Act of 1974, the E-Government Act of 2002 and its accompanying OMB guidance, and the Federal Information Security Management Act (FISMA) of 2002.11 Also of importanceare National Archives and Records Administration (NARA) statutes, including the Federal Records Act (44 U.S.C. Chapters 21, 29, 31, 33) and NARA regulations (Title 36 of the Code of Federal Regulations, Chapter XII, Subchapter B). The Privacy Act governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systemsofrecordsbyfederalagenciesand can be retrieved by a personal identifier (e.g., name). It requires each agency to publish notice of its systems of records (i.e.,a system of records notice (SORN))in theFederalRegisterand to allow individuals to request access to and correction of their records and information. The E-Government Act of 2002, among other things, requires federal agencies to complete a Privacy Impact Assessment (PIA) on all new or substantially changed technology that collects,maintains,or disseminates PII, and to make the results publicly available. M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002, provides direction to agencies on conducting PIAs. A PIA is a structured review of an information system to identify and mitigate privacy risks, including risks to confidentiality, at every stage of the system lifecycle. It can also serve as a tool for individuals working on a program or accessing a system to understand how to best integrate privacy protections when working with PII. 3.2 Data Privacy Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal them selectively. Privacy has the following elements. (i) When: a subject may be more concerned about the current or future information being revealed than information from the past. (ii) How: a user may be comfortable if his/her friends can manually request his/her information, but the user may not like alerts to be sent automatically and frequently. (iii) Extent: a user may rather have his/her information reported as an ambiguous region rather than a precise point. In commerce, consumer's context and privacy need to be protected and used appropriately. In organizations, privacy entails the application of laws, mechanisms, standards, and processes by which personally identifiable information is managed. In the cloud, the privacy meanswhenusersvisitthesensitive data, the cloud services can prevent potential adversary from inferring the user's behavior by the user's visit model (not direct data leakage). Researchers have focused on Oblivious RAM (ORAM) technology. ORAM technology visits several copies of data to hide the real visiting aims of users. ORAM has been widely used in software protection and has been used in protecting the privacy in the cloud as a promising technology. Stefanov et al. proposed that a path ORAM algorithm is state-of-the-art implementation. The privacy issues differ according to different cloud scenarios and can be divided into four subcategories as follows: (i) how to enable users to have control over their data when the data are stored and processed in cloud and avoid theft, nefarious use, and unauthorized resale, (ii) how to guarantee data replications in a jurisdiction and consistent state, where replicating user data to multiple suitable locations is a usual choice, and avoid data loss, leakage, and unauthorized modification or fabrication, (iii) which party is responsible for ensuring legal requirements for personal information? (iv) to what extent cloud subcontractors are involved in processing which can be properly identified, checked, and ascertained.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2067 4. LEGACY Legacy systems are software solutions found in a company for a long period of time [7]. The systems have probably survived in a company because of the software maintenance (corrective, preventive, and evolutionary), internal resistance to technology changes, or they may run critical processes. Usually, these kinds of systems work in isolation and with an exclusive data repository (i.e. data files, databases, etc.). Therefore, the communication between the legacy systems to other newer application is a hard task and it requires the definition of complex communication interfacesanddataconversioncomponents.Additionally,the companies with old legacy systems need to invest money to integrate theirs tools, to adapt functionality to new technologies, and to make flexible their business processes. Most of the companies firstly transform the traditional applications to software based on SOA before adopting the Cloud paradigm, because SOA is flexible to services composition and it encapsulates the business logic through web services (WSs). Those WSscancommunicate eachother by standard protocols and methods of message exchanging, which facilitate the services composition. The SOA applications consist basically of three layers: (a) Presentation Layer: where is the user interface;(b)Business Layer: where are the business logic and its functionality implemented by algorithms, software components or WSs; and (c) Data Layer: where is the schema and application data. The applications can be migrated by layers. A conceptual model of system migration toCloudComputingis presented in Fig. 1). It is considered in the migration model the following techniques: • Application Replacement: it entails replacing the whole application or part of it for one or more standard components available in the market. As a result, some configurations and adaptation task must be conducted as part of the system migration. This replacement cangenerate the loss of information control, the need of creating new interfaces withothercomponentsorapplications,thechange of the normal workflow in the organization, and the lack of information about the internal structure of the acquired components. • Application Conversion: it consists in transforming the whole application in a Cloud Computing solution. The transformation can be conducted automatically using a conversion engine that also maps the converted data, but it is necessary that the legacy system works normalized and without failures. ─ Software Conversion: it is the transformation of algorithms and software applications, keeping their functionalityandtheirstructures, butchanging some programming aspects. ─ Data Conversion: it is the transformation of data according to a specific target schema or format. ─ Schema Conversion: it is the transformation of the data structure to a new equivalent structure ofdatabase. • Application Virtualization: it basically involves the generation of virtual system container, and all system components and data schema are moved into the container without changing the source code. The legacy system is considered as a black box, within which all layers are encapsulated. During the users’ interaction, all the inputs/outputs are analyzed to generate a “wrapper” that is the nexus between the encapsulated legacy system and the new presentation layer deployed in Cloud Computing. 5. CONCLUSIONS In the cloud architecture, some malicious nodesmayjoin the network which is responsible to trigger zombie attack inthe network. These zombie nodes can spoof the information of the legitimate user and communicate with virtual machine on the behalf of legitimate user. This will lead toreductionin network performance in terms of delay and bandwidth consumption. As cloud computing faces various security issues which lead to the exposure of confidential data of users. These security issues make users unstable about the efficiency, safety and reliability in cloud computing. In this review paper, we presented NICE to protect cloud virtual networking environment from DDoS attack. NICE construct attack graph predicts the nextstepoftheattackers and provides optimized countermeasure. NICE software switches implement the countermeasure against zombie explorative attack dynamically. To improve the detection accuracy, NICE are needed to be implement in distributed fashion. The proposed solution can reduce the risk of cloud system being misused by internal and external attack. The experimental results show less amount of CPU utilization and better success measure rate of traffic load. 6. ACKNOWLEDGEMENT Authors would like to thank Roorkee College ofEngineering, Roorkee, Dist-Haridwar, Uttarakhand, India. 7. REFERENCES [1] https://aws.amazon.com/what-is-cloud-computing/ [2] https://www.infoworld.com/article/2683784/what-is- cloud-computing.html [3] NIST, The NIST Definition of Cloud Computing, P. Mell and T. Grance, Editors. 2009, National Institute of Standards and Technology. [4] Smith, D.M., Hype Cycle for Cloud Computing, in Gartner Research Report. 2011. p. 9-11. [5] S. Choudhary, G. Pundir, Y. Singh, Detection and Isolation of Zombie Attack under Cloud Computing, in International Research Journal of Engineering and Technology (IRJET). Vol – 7, Issue-01, Jan 2020. p. 1419- 1424.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2068 [6] Winkler, V. J. R. (2011). Securing the cloud: Cloud computer security techniques and tactics. Waltham, MA: Syngress. [7] Mather, T., Kumaraswamy, S. & Latif, S. (2009). Cloud security and privacy: An enterprise perspective on risks and compliance. Sebastopol, CA: O'Reilly Media, Inc. [8] Mell, P. & Grance, T. (2011). The NIST definition of cloud computing, National Institute of Standards and Technology. NIST Special Publication, 800‐145. [9] North Bridge. (2013). Future of Cloud Computing Survey 2013. Retrieved November 12, 2013, from North Bridge website: http://www.northbridge.com/2013‐cloud‐computing‐su rvey. [10] Yankee Survey. (2010).TheAnywhereEnterprise:2010 U.S. Cloud Computing FastView Survey. Retrieved November 12, 2013, from Yankee Group website: http://www.yankeegroup.com/about_us/press_releases /2010‐08‐23.html. [11]Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu, International Journal of Distributed Sensor Networks, Volume: 10 issue: 7,July 2014, https://journals.sagepub.com/doi/pdf/10.1155/2014/1 90903 [12] Zalazar, Ana & Gonnet, Silvio & Leone, Horacio. (2015). Migration of Legacy Systems to Cloud Computing. Electronic Journal of SADIO. 14. 8. BIOGRAPHIES Anurag Chandna completed his M.C.A. and Master of Technology (M.Tech). He published more than 15 International journals and attends many conferences in reputed institute and university. Dr. Yashveer Singh completedhis Master of Technology (M.Tech) in 2011 and Doctorate of philosophy (Ph.D) in 2016. He published more than 15 International journals and attends many conferences in reputed institute and university. Sagar Choudhary graduated from Uttarakhand Technical University, Dehradun, India (B.Tech-I.T.) in 2011 and received his Master’s from Uttarakhand Technical University, Dehradun, India (M.Tech-C.S.E.) in 2014. Currently he is working in RoorkeeCollegeof Engineering as Assistant Professor in the department of Computer Science and Engineering. His area of interest are wireless networks and cloud computing.