Cloud Computing : Security Issues And Resource Allocation Policies

Gaurav Sharma, Urvashi Garg, A.P, Arun Jain, A.P, Loveleena Mukhija, A.P


Cloud computing is the combination of distributed computing, grid computing and parallel technologies which define the shape of a new era. In this technology client data is stored and maintain in the data center of a cloud provider like Google, Amazon and Microsoft etc. It has inherited the legacy technology and including unique ideas. Industries, such as education, banking and healthcare are moving towards the cloud due to the efficiency of services such as transactions carried out, processing power used, bandwidth consumed, data transferred etc. There are various challenges  for adopting cloud computing such as privacy ,interoperability, managed service level agreement (SLA) and reliability. In this paper we survey challenges in resources allocation and the security issues of the cloud environment.

Full Text:



T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010.

Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal. "Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities." In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on, pp. 5-13. Ieee, 2008.

Marston, Sean, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang, and Anand Ghalsasi. "Cloud computing—The business perspective." Decision Support Systems 51, no. 1 (2011): 176-189.

Wu, Linlin, Saurabh Kumar Garg, and Rajkumar Buyya. "Sla-based resource allocation for software as a service provider (saas) in cloud computing environments." In Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, pp. 195-204. IEEE, 2011.

S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “Cloud Computing Research and Development Trend,” In Proceedings of the 2010 Second International Conference on Future Networks (ICFN '10). IEEE Computer Society, Washington, DC, USA, pp. 93-97. DOI=10.1109/ICFN.2010.

Prasad, A.S.; Rao, S.,"A Mechanism Design Approach to Resource Procurement in Cloud Computing",IEEE,Computers, IEEE Transactions on,2014

Zuling Kang; Hongbing Wang,"A Novel Approach to Allocate Cloud Resource with Different Performance Traits",IEEE,Services Computing (SCC), 2013 IEEE International Conference on,2013

Chunguang Wang; Qingbo Wu; Yusong Tan; Deke Guo; Quanyuan Wu,"VCE-PSO: Virtual Cloud Embedding through a Meta-heuristic Approach",IEEE,High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on,2013

Rong Yu; Yan Zhang; Gjessing, S.; Wenlong Xia; Kun Yang,"Toward cloud-based vehicular networks with efficient resource management",IEEE,Network, IEEE,2013

Parikh, S.M.,"A survey on cloud computing resource allocation techniques",IEEE,Engineering (NUiCONE), 2013 Nirma University International Conference on,2013

P. Kalagiakos “Cloud Computing Learning,” 2011 5th International Conference on Application of Information and Communication Technologies (AICT), Baku pp. 1 - 4, DOI=12-14 Oct. 2011.

Sheng Di; Cho-Li Wang; Cappello, F.,"Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors",IEEE,Cloud Computing, IEEE Transactions on,2014

Kumar, A.; Pilli, E.S.; Joshi, R.C.,"An efficient framework for resource allocation in cloud computing",IEEE,Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on,2013

Di. S.; Kondo, D.; Wang, C.,"Optimization of Composite Cloud Service Processing with Virtual Machines",IEEE,Computers, IEEE Transactions on,2014

Srinivasa, K.G.; Kumar, K.S.; Kaushik, U.S.; Srinidhi, S.; Shenvi, V.; Mishra, K.,"Game theoretic resource allocation in cloud computing",IEEE,Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the,2014.

A. K. Bhardwaj, R. Mahajan and Surinder, “Improved Load Management In Cloud Environment Using MHT Algorithm”, published in, “Int’l J. of Control Theory and Applications (2016) ” Vol. 9(22), pp. 301-305.

A.K Bhardwaj, R. Mahajan and Surender, “TTP based Vivid Protocol Design for Authentication and Security for Cloud”, published in IEEE Xplore (2016); pp. 3275-3278.

A. Kumar, Surender and R. Mahajan, “A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud”, Published in International Journal of Advanced Computer Science and Applications (IJACSA) (2015), Vol. 6, No. 9, Pg. 179-184.

Pawan Kumar, S. Singh and Surender Jangra, “Design and Implementation of Encryption based Data Security Algorithm for Cloud Environments ”, Published in, “Int’l J. of Control Theory and Applications (2017)”, Vol. 10, Issue No. 15, Pg. 163-171.

Vishal, Bikrampal Kaur and Surender Jangra, “Protection and Security Models for Mobile Cloud Computing: A Review” ” published in “Int’l J. of Engineering and Management Research [IJEMR]”, Vol. 7, Issue 3, May-June 2017, Pg. 695-700, ISSN (Online): 2250-0758, ISSN (Print): 2394-6962.

Naveen Garg, Sanjay Singla and Surender, “Challenges and Techniques for Testing of Big” published in the Journal, “Procedia Computer Science (Elsevier)”, 85 (2016), Pg. 940-948, DOI: 10.1016/j.procs.2016.05.285, ISSN: 1877-0509.

Surender, Sachin Kumar and Shashi Bhushan, “Study of Attacks & Countermeasures on Layers of Wireless Sensor Networks”, Published in, “Int’l J. of Control Theory and Applications”, Vol. 10 (2017), Issue No. 15, Pg. 153-162, ISSN: 0974-5572.

Sharma, P.K., Mahajan, R. & Surender, “A Security Architecture Attacks Detection and Authentication in Wireless Mess Network” Cluster Computing (2017). doi:10.1007/s10586-017-0970-9.

Parveen Kumar Sharma, Rajiv Mahajan and Surender, “Authentication based Secure Protocol using TTP for Wireless Mobile Networks” published in IEEE Explore (2016), Pg. 3286-3290.

Parveen Kumar Sharma, Rajiv Mahajan and Surender, “Trust Based Secure Routing With Authentication for Wireless Mesh”, published in, IJCTA, Vol. 9(23), 2016, Pg. 33-38, ISSN: 0974-5572.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.