SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 48-49
www.iosrjournals.org
DOI: 10.9790/0661-17214849 www.iosrjournals.org 48 | Page
Networking Issues and Challenges In Cloud Computing
Yogesh Kumar1
, Rajan Prasad Tripathi2
1, 2,
(Electronics & Comm., Amity School Of Engineering., India)
Abstract: It is used in designing of network architecture and computer resource. There is cloud of computers.
Use of cloud network reduces the requirement of hardware and software.
Keywords: Cloud computing, Computer, Network, data breach, data authentication.
I. Introduction
If we have more than one computer then no need to install the software on all of them. We need to have
one application that would allow us to run the program using remote computer. The software and storage does
not exist on computer. It is on the service’s computer cloud. That is client computer need to run cloud
computing system interface software. For example if we need to check our email then we need not to install the
software. We require login to account remotely. But there are several challenges like data protection, user
authentication, data breach etc that need to be considered. Also network computers traffic issue.
II. Operation
The cloud of network computers handles the task. So the hardware and software requirement reduces at
client side. The client runs the application. The request is sent to the network computer. These computers access
the server and database and after finishing of task sent to the client computer. It creates a virtual network which
exists but physically not available.
Figure 1.1
During implementation of a cloud computing strategy means placing critical data in the hands of a third
party. Therefore we need to ensure the data must be secure. Data must be encrypted all the times, with clearly
defined roles when it comes to who will be managing the encryption keys. In most cases, the only way to truly
ensure confidentiality of encrypted data that resides on a cloud provider's storage servers is for the client to own
and manage the data encryption keys. Another important challenge in cloud computing is cloud network should
provide all necessary security measures to protect the data and the access to that data. In case of unexpected
error data must be secured and there must be way to ensure the integrity and availability of that data.
III. Cloud Architecture
Cloud architecture,[1]
typically involves multiple cloud components communicating with each other. It
is based on frontend and backend. Both connected to each other through network. The network usually used is
the internet. User interface is available at front end and cloud section is at back end.
Networking Issues and Challenges in Cloud Computing
DOI: 10.9790/0661-17214849 www.iosrjournals.org 49 | Page
Figure 1.2
The service model for cloud provides accessing of service hosted in the cloud. It also enables client to
deploy their own software and application in the cloud. The deployment model includes private cloud,
community cloud, public cloud and hybrid cloud. Using cloud computing, the demand of client hardware and
software decreases. Therefore it is economical as no need to install the software to all computers. Also hardware
upgradation reduces as it works on cloud computers. But there are some security challenges. Cloud computing
opens up a new world of opportunity for business, but mixed in with these opportunities are numerous security
challenges that need to be considered and addressed prior to committing to a cloud computing strategy. Cloud
computing security challenges fall into three broad categories: first is data protection as securing data both at
database and during use. Second is user authentication as limiting access to data and monitoring who access the
data. Third is disaster and data breach contingency planning. Some of these challenges may cause slow down
the services in the cloud. It can be resolved by care and attention during planning stages. The security
mechanisms between client and cloud network need to be robust. The alternate is use of hybrid cloud network.
Also we can suggest an open cloud computing interface.
We can introduce agile technique i.e. agile in cloud. As the client requirements are changing with
technology and we should welcome changes which result in dynamic network and support future extensions i.e.
we should try to find agility in cloud.
IV. Conclusion
Cloud network can be used in full commercial exploitation. We can resolve certain degree of risks but
cannot resolve all the problems. There is still much to explore.
References
[1]. "Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures". Developer.amazonwebservices.com. Retrieved 2010-08-22.
[2]. "Cloud Computing entry". NetLingo. Retrieved 15 January 2014.
[3]. University of Michiganhttp://it.umich.edu/initiatives/cloud/content/what-cloud. Retrieved 15 January 2014.
[4]. "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011.
[5]. "What is Cloud Computing?". Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.

More Related Content

PDF
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
PDF
A Study on Cloud and Fog Computing Security Issues and Solutions
DOCX
fog computing provide security to the data in cloud
PPTX
Fog computing paper presentation
PDF
Solutions of cloud computing security issues
PDF
FRAMEWORK FOR SECURE CLOUD COMPUTING
PDF
FOGCOMPUTING
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
A Study on Cloud and Fog Computing Security Issues and Solutions
fog computing provide security to the data in cloud
Fog computing paper presentation
Solutions of cloud computing security issues
FRAMEWORK FOR SECURE CLOUD COMPUTING
FOGCOMPUTING
Fog computing a new concept to minimize the attacks and to provide security i...

What's hot (18)

PPT
Fog computing provide security to data in cloud ppt
PDF
Data Storage Issues in Cloud Computing
PPTX
IoT and Cloud Computing in Automation Application
PPTX
Fog computing ( foggy cloud)
PDF
Analysis of classical encryption techniques in cloud computing
PPTX
Fog computing
PDF
Security Issues of IoT with Fog
PDF
A brief review: security issues in cloud computing and their solutions
PPTX
cloud security using Fog Computing
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
DOCX
Fog computing document
PDF
Security Issues in Cloud Computing - A Review
PDF
Cloud computing and security issues in the
PDF
A Study of Data Storage Security Issues in Cloud Computing
PDF
Paper published
DOCX
Fog doc
DOCX
What is fog computing
Fog computing provide security to data in cloud ppt
Data Storage Issues in Cloud Computing
IoT and Cloud Computing in Automation Application
Fog computing ( foggy cloud)
Analysis of classical encryption techniques in cloud computing
Fog computing
Security Issues of IoT with Fog
A brief review: security issues in cloud computing and their solutions
cloud security using Fog Computing
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
Fog computing document
Security Issues in Cloud Computing - A Review
Cloud computing and security issues in the
A Study of Data Storage Security Issues in Cloud Computing
Paper published
Fog doc
What is fog computing
Ad

Viewers also liked (11)

DOCX
PDF
Marliana
PDF
Data Usage Monitor for a Shared Wireless Network Connection
PDF
RAP_WorldBank_LowCarbonPowerOptionsForChina
PPT
GE13 G1 class1 Jul 22nd
PDF
ΠΙΣΤΟΠΟΙΗΤΙΚΟ ΚΑΝΟΝΙΣΤΙΚΗ ΣΥΜΜΟΡΦΩΣΗ
DOC
Todd Bollinger 20151114
PPTX
Memeala
PPTX
How to fill existing gaps in current attempts at circular business models an...
PDF
Libroo3
PDF
Cuadro estratigraficos-de-las-edades-geologicas
Marliana
Data Usage Monitor for a Shared Wireless Network Connection
RAP_WorldBank_LowCarbonPowerOptionsForChina
GE13 G1 class1 Jul 22nd
ΠΙΣΤΟΠΟΙΗΤΙΚΟ ΚΑΝΟΝΙΣΤΙΚΗ ΣΥΜΜΟΡΦΩΣΗ
Todd Bollinger 20151114
Memeala
How to fill existing gaps in current attempts at circular business models an...
Libroo3
Cuadro estratigraficos-de-las-edades-geologicas
Ad

Similar to Networking Issues and Challenges In Cloud Computing (20)

PDF
G033030035
PDF
PDF
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
PDF
B1802041217
PDF
Ant colony Optimization: A Solution of Load balancing in Cloud  
PDF
The Riisk and Challllenges off Clloud Computtiing
PDF
Eb31854857
PDF
Security Issues’ in Cloud Computing and its Solutions.
PDF
B018211016
PDF
A survey on data security in cloud computing issues and mitigation techniques
PPTX
Cloud Computing Security Issues
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
PDF
Cloud data security and various cryptographic algorithms
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
PDF
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
PDF
Security policy enforcement in cloud infrastructure
G033030035
Ijarcet vol-2-issue-4-1405-1409
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
B1802041217
Ant colony Optimization: A Solution of Load balancing in Cloud  
The Riisk and Challllenges off Clloud Computtiing
Eb31854857
Security Issues’ in Cloud Computing and its Solutions.
B018211016
A survey on data security in cloud computing issues and mitigation techniques
Cloud Computing Security Issues
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
Cloud data security and various cryptographic algorithms
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Enhancing Data Storage Security in Cloud Computing Through Steganography
A Survey on Cloud Computing Security – Challenges and Trust Issues
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
Security policy enforcement in cloud infrastructure

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Project quality management in manufacturing
PDF
composite construction of structures.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Digital Logic Computer Design lecture notes
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Lecture Notes Electrical Wiring System Components
Sustainable Sites - Green Building Construction
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding
Safety Seminar civil to be ensured for safe working.
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Project quality management in manufacturing
composite construction of structures.pdf
UNIT 4 Total Quality Management .pptx
Digital Logic Computer Design lecture notes
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT on Performance Review to get promotions
Current and future trends in Computer Vision.pptx
Lecture Notes Electrical Wiring System Components

Networking Issues and Challenges In Cloud Computing

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 48-49 www.iosrjournals.org DOI: 10.9790/0661-17214849 www.iosrjournals.org 48 | Page Networking Issues and Challenges In Cloud Computing Yogesh Kumar1 , Rajan Prasad Tripathi2 1, 2, (Electronics & Comm., Amity School Of Engineering., India) Abstract: It is used in designing of network architecture and computer resource. There is cloud of computers. Use of cloud network reduces the requirement of hardware and software. Keywords: Cloud computing, Computer, Network, data breach, data authentication. I. Introduction If we have more than one computer then no need to install the software on all of them. We need to have one application that would allow us to run the program using remote computer. The software and storage does not exist on computer. It is on the service’s computer cloud. That is client computer need to run cloud computing system interface software. For example if we need to check our email then we need not to install the software. We require login to account remotely. But there are several challenges like data protection, user authentication, data breach etc that need to be considered. Also network computers traffic issue. II. Operation The cloud of network computers handles the task. So the hardware and software requirement reduces at client side. The client runs the application. The request is sent to the network computer. These computers access the server and database and after finishing of task sent to the client computer. It creates a virtual network which exists but physically not available. Figure 1.1 During implementation of a cloud computing strategy means placing critical data in the hands of a third party. Therefore we need to ensure the data must be secure. Data must be encrypted all the times, with clearly defined roles when it comes to who will be managing the encryption keys. In most cases, the only way to truly ensure confidentiality of encrypted data that resides on a cloud provider's storage servers is for the client to own and manage the data encryption keys. Another important challenge in cloud computing is cloud network should provide all necessary security measures to protect the data and the access to that data. In case of unexpected error data must be secured and there must be way to ensure the integrity and availability of that data. III. Cloud Architecture Cloud architecture,[1] typically involves multiple cloud components communicating with each other. It is based on frontend and backend. Both connected to each other through network. The network usually used is the internet. User interface is available at front end and cloud section is at back end.
  • 2. Networking Issues and Challenges in Cloud Computing DOI: 10.9790/0661-17214849 www.iosrjournals.org 49 | Page Figure 1.2 The service model for cloud provides accessing of service hosted in the cloud. It also enables client to deploy their own software and application in the cloud. The deployment model includes private cloud, community cloud, public cloud and hybrid cloud. Using cloud computing, the demand of client hardware and software decreases. Therefore it is economical as no need to install the software to all computers. Also hardware upgradation reduces as it works on cloud computers. But there are some security challenges. Cloud computing opens up a new world of opportunity for business, but mixed in with these opportunities are numerous security challenges that need to be considered and addressed prior to committing to a cloud computing strategy. Cloud computing security challenges fall into three broad categories: first is data protection as securing data both at database and during use. Second is user authentication as limiting access to data and monitoring who access the data. Third is disaster and data breach contingency planning. Some of these challenges may cause slow down the services in the cloud. It can be resolved by care and attention during planning stages. The security mechanisms between client and cloud network need to be robust. The alternate is use of hybrid cloud network. Also we can suggest an open cloud computing interface. We can introduce agile technique i.e. agile in cloud. As the client requirements are changing with technology and we should welcome changes which result in dynamic network and support future extensions i.e. we should try to find agility in cloud. IV. Conclusion Cloud network can be used in full commercial exploitation. We can resolve certain degree of risks but cannot resolve all the problems. There is still much to explore. References [1]. "Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures". Developer.amazonwebservices.com. Retrieved 2010-08-22. [2]. "Cloud Computing entry". NetLingo. Retrieved 15 January 2014. [3]. University of Michiganhttp://it.umich.edu/initiatives/cloud/content/what-cloud. Retrieved 15 January 2014. [4]. "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011. [5]. "What is Cloud Computing?". Amazon Web Services. 2013-03-19. Retrieved 2013-03-20.