SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 48-49
www.iosrjournals.org
DOI: 10.9790/0661-17214849 www.iosrjournals.org 48 | Page
Networking Issues and Challenges In Cloud Computing
Yogesh Kumar1
, Rajan Prasad Tripathi2
1, 2,
(Electronics & Comm., Amity School Of Engineering., India)
Abstract: It is used in designing of network architecture and computer resource. There is cloud of computers.
Use of cloud network reduces the requirement of hardware and software.
Keywords: Cloud computing, Computer, Network, data breach, data authentication.
I. Introduction
If we have more than one computer then no need to install the software on all of them. We need to have
one application that would allow us to run the program using remote computer. The software and storage does
not exist on computer. It is on the service’s computer cloud. That is client computer need to run cloud
computing system interface software. For example if we need to check our email then we need not to install the
software. We require login to account remotely. But there are several challenges like data protection, user
authentication, data breach etc that need to be considered. Also network computers traffic issue.
II. Operation
The cloud of network computers handles the task. So the hardware and software requirement reduces at
client side. The client runs the application. The request is sent to the network computer. These computers access
the server and database and after finishing of task sent to the client computer. It creates a virtual network which
exists but physically not available.
Figure 1.1
During implementation of a cloud computing strategy means placing critical data in the hands of a third
party. Therefore we need to ensure the data must be secure. Data must be encrypted all the times, with clearly
defined roles when it comes to who will be managing the encryption keys. In most cases, the only way to truly
ensure confidentiality of encrypted data that resides on a cloud provider's storage servers is for the client to own
and manage the data encryption keys. Another important challenge in cloud computing is cloud network should
provide all necessary security measures to protect the data and the access to that data. In case of unexpected
error data must be secured and there must be way to ensure the integrity and availability of that data.
III. Cloud Architecture
Cloud architecture,[1]
typically involves multiple cloud components communicating with each other. It
is based on frontend and backend. Both connected to each other through network. The network usually used is
the internet. User interface is available at front end and cloud section is at back end.
Networking Issues and Challenges in Cloud Computing
DOI: 10.9790/0661-17214849 www.iosrjournals.org 49 | Page
Figure 1.2
The service model for cloud provides accessing of service hosted in the cloud. It also enables client to
deploy their own software and application in the cloud. The deployment model includes private cloud,
community cloud, public cloud and hybrid cloud. Using cloud computing, the demand of client hardware and
software decreases. Therefore it is economical as no need to install the software to all computers. Also hardware
upgradation reduces as it works on cloud computers. But there are some security challenges. Cloud computing
opens up a new world of opportunity for business, but mixed in with these opportunities are numerous security
challenges that need to be considered and addressed prior to committing to a cloud computing strategy. Cloud
computing security challenges fall into three broad categories: first is data protection as securing data both at
database and during use. Second is user authentication as limiting access to data and monitoring who access the
data. Third is disaster and data breach contingency planning. Some of these challenges may cause slow down
the services in the cloud. It can be resolved by care and attention during planning stages. The security
mechanisms between client and cloud network need to be robust. The alternate is use of hybrid cloud network.
Also we can suggest an open cloud computing interface.
We can introduce agile technique i.e. agile in cloud. As the client requirements are changing with
technology and we should welcome changes which result in dynamic network and support future extensions i.e.
we should try to find agility in cloud.
IV. Conclusion
Cloud network can be used in full commercial exploitation. We can resolve certain degree of risks but
cannot resolve all the problems. There is still much to explore.
References
[1]. "Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures". Developer.amazonwebservices.com. Retrieved 2010-08-22.
[2]. "Cloud Computing entry". NetLingo. Retrieved 15 January 2014.
[3]. University of Michiganhttp://it.umich.edu/initiatives/cloud/content/what-cloud. Retrieved 15 January 2014.
[4]. "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
[5]. "What is Cloud Computing?". Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.

More Related Content

What's hot

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
Areej Qasrawi
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
Fog computing
Fog computingFog computing
Fog computing
Ayush Chaurasia
 
Fog
FogFog
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
Achu Anna
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
TELKOMNIKA JOURNAL
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
Eswar Publications
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
IJNSA Journal
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Paper published
Paper published Paper published
Paper published
University of Fallujah
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 

What's hot (18)

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog
FogFog
Fog
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Paper published
Paper published Paper published
Paper published
 
Fog doc
Fog doc Fog doc
Fog doc
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 

Viewers also liked

Ibiza holidays
Ibiza holidaysIbiza holidays
Il mattino
Il mattinoIl mattino
Il mattino
mimmoannunziata
 
Going to athens
Going to athensGoing to athens
Ibiza
IbizaIbiza
Álvaro miguel carranza montalvo facebook web internet
Álvaro miguel carranza montalvo facebook web internetÁlvaro miguel carranza montalvo facebook web internet
Álvaro miguel carranza montalvo facebook web internet
Consultorio Médico,Bolivia,White Skin,Saint,Sexualidad,Cristo,Dios,Sexy,Piel Blanca
 
Our summer holdays in salou
Our summer holdays in salouOur summer holdays in salou
Our summer holdays in salou
arantza lopez santia LOPEZ Santiago
 
UTE. DIVERSIDAD EN EL AULA
UTE. DIVERSIDAD EN EL AULAUTE. DIVERSIDAD EN EL AULA
UTE. DIVERSIDAD EN EL AULA
mauricioms89
 
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
MedicReS
 
El judo
El judoEl judo
El judo
vicaaron
 
Five exciting fields for entrepreneurs in 2015
Five exciting fields for entrepreneurs in 2015Five exciting fields for entrepreneurs in 2015
Five exciting fields for entrepreneurs in 2015
Laurent Haug
 
five great tips for being successful in the art of programming.
 five great tips for being successful in the art of programming. five great tips for being successful in the art of programming.
five great tips for being successful in the art of programming.
Jenny Jordan
 

Viewers also liked (13)

Alltickets
AllticketsAlltickets
Alltickets
 
Ibiza holidays
Ibiza holidaysIbiza holidays
Ibiza holidays
 
Il mattino
Il mattinoIl mattino
Il mattino
 
Going to athens
Going to athensGoing to athens
Going to athens
 
Img 0003
Img 0003Img 0003
Img 0003
 
Ibiza
IbizaIbiza
Ibiza
 
Álvaro miguel carranza montalvo facebook web internet
Álvaro miguel carranza montalvo facebook web internetÁlvaro miguel carranza montalvo facebook web internet
Álvaro miguel carranza montalvo facebook web internet
 
Our summer holdays in salou
Our summer holdays in salouOur summer holdays in salou
Our summer holdays in salou
 
UTE. DIVERSIDAD EN EL AULA
UTE. DIVERSIDAD EN EL AULAUTE. DIVERSIDAD EN EL AULA
UTE. DIVERSIDAD EN EL AULA
 
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
FDA 2013 Clinical Investigator Training Course: Ensuring the Safety of Clinic...
 
El judo
El judoEl judo
El judo
 
Five exciting fields for entrepreneurs in 2015
Five exciting fields for entrepreneurs in 2015Five exciting fields for entrepreneurs in 2015
Five exciting fields for entrepreneurs in 2015
 
five great tips for being successful in the art of programming.
 five great tips for being successful in the art of programming. five great tips for being successful in the art of programming.
five great tips for being successful in the art of programming.
 

Similar to G017214849

G033030035
G033030035G033030035
G033030035
ijceronline
 
489 493
489 493489 493
70 74
70 7470 74
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
IJERA Editor
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
IJERA Editor
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
B018211016
B018211016B018211016
B018211016
IOSR Journals
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
IJECEIAES
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
cscpconf
 

Similar to G017214849 (20)

G033030035
G033030035G033030035
G033030035
 
489 493
489 493489 493
489 493
 
70 74
70 7470 74
70 74
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
B1802041217
B1802041217B1802041217
B1802041217
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
B018211016
B018211016B018211016
B018211016
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

G017214849

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 48-49 www.iosrjournals.org DOI: 10.9790/0661-17214849 www.iosrjournals.org 48 | Page Networking Issues and Challenges In Cloud Computing Yogesh Kumar1 , Rajan Prasad Tripathi2 1, 2, (Electronics & Comm., Amity School Of Engineering., India) Abstract: It is used in designing of network architecture and computer resource. There is cloud of computers. Use of cloud network reduces the requirement of hardware and software. Keywords: Cloud computing, Computer, Network, data breach, data authentication. I. Introduction If we have more than one computer then no need to install the software on all of them. We need to have one application that would allow us to run the program using remote computer. The software and storage does not exist on computer. It is on the service’s computer cloud. That is client computer need to run cloud computing system interface software. For example if we need to check our email then we need not to install the software. We require login to account remotely. But there are several challenges like data protection, user authentication, data breach etc that need to be considered. Also network computers traffic issue. II. Operation The cloud of network computers handles the task. So the hardware and software requirement reduces at client side. The client runs the application. The request is sent to the network computer. These computers access the server and database and after finishing of task sent to the client computer. It creates a virtual network which exists but physically not available. Figure 1.1 During implementation of a cloud computing strategy means placing critical data in the hands of a third party. Therefore we need to ensure the data must be secure. Data must be encrypted all the times, with clearly defined roles when it comes to who will be managing the encryption keys. In most cases, the only way to truly ensure confidentiality of encrypted data that resides on a cloud provider's storage servers is for the client to own and manage the data encryption keys. Another important challenge in cloud computing is cloud network should provide all necessary security measures to protect the data and the access to that data. In case of unexpected error data must be secured and there must be way to ensure the integrity and availability of that data. III. Cloud Architecture Cloud architecture,[1] typically involves multiple cloud components communicating with each other. It is based on frontend and backend. Both connected to each other through network. The network usually used is the internet. User interface is available at front end and cloud section is at back end.
  • 2. Networking Issues and Challenges in Cloud Computing DOI: 10.9790/0661-17214849 www.iosrjournals.org 49 | Page Figure 1.2 The service model for cloud provides accessing of service hosted in the cloud. It also enables client to deploy their own software and application in the cloud. The deployment model includes private cloud, community cloud, public cloud and hybrid cloud. Using cloud computing, the demand of client hardware and software decreases. Therefore it is economical as no need to install the software to all computers. Also hardware upgradation reduces as it works on cloud computers. But there are some security challenges. Cloud computing opens up a new world of opportunity for business, but mixed in with these opportunities are numerous security challenges that need to be considered and addressed prior to committing to a cloud computing strategy. Cloud computing security challenges fall into three broad categories: first is data protection as securing data both at database and during use. Second is user authentication as limiting access to data and monitoring who access the data. Third is disaster and data breach contingency planning. Some of these challenges may cause slow down the services in the cloud. It can be resolved by care and attention during planning stages. The security mechanisms between client and cloud network need to be robust. The alternate is use of hybrid cloud network. Also we can suggest an open cloud computing interface. We can introduce agile technique i.e. agile in cloud. As the client requirements are changing with technology and we should welcome changes which result in dynamic network and support future extensions i.e. we should try to find agility in cloud. IV. Conclusion Cloud network can be used in full commercial exploitation. We can resolve certain degree of risks but cannot resolve all the problems. There is still much to explore. References [1]. "Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures". Developer.amazonwebservices.com. Retrieved 2010-08-22. [2]. "Cloud Computing entry". NetLingo. Retrieved 15 January 2014. [3]. University of Michiganhttp://it.umich.edu/initiatives/cloud/content/what-cloud. Retrieved 15 January 2014. [4]. "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011. [5]. "What is Cloud Computing?". Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.