Download

Critical Analysis of Cloud Computing Architecture: Past,Present and Future

Cloud Computing has become a global phenomenon in transforming the IT landscape. Its user-friendly characteristics like pay-as-you-go, service on demand, accessibility, etc. Makes it an IT paradigm of recent times. Cloud computing has many architectures based on its numer- ous characteristics. This research will identify, examine, and explain past, present, and future trends. Moreover, it should also present a proposed guideline to improve cloud-based adoption using available cloud architectures. This research is concerned with two areas related to the field of architecture analysis within cloud computing systems, the first is giving an overview of cloud deployment models, the history of its inception, and the techniques used within it, and the second is showing the different architecture of the cloud in terms of Pros, Cons, Strength- ens, and weaknesses in different past/current cloud computing architectures. Currently, a large number of users keep and share a large amount of their data on the cloud, therefore, there is a necessary need to consider the current cloud architecture and find mechanisms to develop it and fill the gaps within it. In this paper, we focus on an emerging and powerful technology area that is proving to exist day by day, which is security within cloud computing systems. We found that several studies discussing architecture in the cloud were previously published and mentioned in our work; However, only a few of them focused on improving security. The main objective of this research is to explore existing risk management frameworks in order to under- stand, review and thus provide suggestions to build a more robust risk management framework that is appropriate for the cloud computing environment. The latest findings in this field were used to suggest a security approach based on effective management of the security risks that occur within cloud computing systems. It recommended that the approach must achieve its desired goal of building an effective security system capable of dealing with potential security risks and recovery mechanisms that can be launched to address various types of threats within the cloud computing environment.

Information

  • Students: Ameera AlMutairi - Bashayer Alrashidi - Ghada Alrashidi - Samar Alhariqi - Somaya alrasheedi
  • Supervisor: Dr. Nabeel Ahmed Khan
  • Research Specialization: Classification methods
  • Upload Date: 20/02/2023