Cloud Storage Architecture: Issues, Challenges and Opportunities

Authors

  • Shalini Bhaskar Bajaj Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Gurugram, Haryana, India Author
  • Aman Jatain Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Gurugram, Haryana, India Author
  • Pooja Nagpal Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Gurugram, Haryana, India Author

Keywords:

Internet of Things, Artificial Intelligence, Security, FOG computing, Cloud Storage

Abstract

With the advent of new emerging tech nologies like fog computing, internet of things, blockchain, artificial intelligence etc, information and communication technology is revolutionising our homes, education, health and industry. By the year 2025, with the increase in net work speed offered by 5G technology, we will be able to share much more data in real time. It’s not only important to note that the volume of data shared in future will be huge but also its important to understand that the shared data will be heterogenous in nature. Not only humans but smart devices will act as humans on the network and will generate big data. Thus, the future of cloud storage indus try seems to be very bright. The effort in this paper is to recognise the issues and challenges that the cloud storage industry will face in the near future and also to identify and review the new paradigm for researchers in the field of cloud storage.

Downloads

Download data is not yet available.

References

“Forbes: Cloud computing forecast,” https://www.forbes.com/sites/louiscolumbus/2017/04/29/ roundup-of-cloud-computing

forecasts2017/#5c42322c31e8/, 2020.

X.Wang,B.Wang,andJ.Huang,“Cloud computing and its key techniques computer science and automation engineer ing(csae),”inInternationalConference on Cloud Computing. Shanghai, China: IEEE, 2011, pp. 404–410.

W.Songyun,Y.Jiabin,L.Xin,Q.Zhuzhong,A.Fabio,andY.Ilsun ,“Active data replica recovery for quality-assurance big data analysis in ic-iot,” IEEE Access, vol. 7, pp. 106 997 – 107 005, 2019.

S.Karen,“Iot big data security and privacy versus innova tion,” IEEE Internet of Things Journal, vol.6, no.2, pp.1628– 1635, 2019.

S. Syed Attique, Z. S. Dursun, H. Sufian, and D. Dirk, “The rising role of big data analytics and iot in disaster manage ment: Recent advances, taxonomy and prospects,” IEEE Ac cess, vol. 7, pp. 54 595 – 54 614, 2019.

Q.Basheer,A.-F.Ala,A.Gupta,B.Driss,A.Safaa,and Q.Junaid,“Leveraging machine learning and big data for smart buildings: A comprehensive survey,” IEEE Access, vol. 7, pp. 90 316 – 90 356, 2019.

S. Rui, L. Shanyun, W. Shuo, X. Ke, and F. Pingyi, “Im portance of small probability events in big data: Information measures, applications, and challenges,” IEEE Access, vol. 7, pp. 100 363 – 100 382, 2019.

B.Afzal, G.Anwar, S.Shahaboddin, A.Giuseppe, and P.Antonio, “Performance based service level agreement (psla) in cloud computing to optimise penalties and reve nue,” IET Communications, 2020.

B. Afzal, S. Shahaboddin, G. Anwar, and C. Anthony, “Op timizing iaas provider revenue through customer satisfaction and efficient resource provisioning in cloud computing,” IET Communications, vol. 13, no. 9, pp. 2913–2922, 2019.

Ankita, V. Gregory, H. Seghbroecka, F. Morab, T. De, and V. Bruno, “Spech: A scalable framework for data placement of data-intensive services in geo-distributed clouds,” Journal of Network and Computer Applications, vol. 142, pp. 1–14, 2019.

Z.Lei,F.Anmin,Y. Shui, S. Mang and K.Boyu, “Data integ rity verification of the outsourced big data in the cloud en vironment: A survey,” Journal of Network and Computer Applications, vol. 112, pp. 1–15, 2019.

A.Sidra,U.Saif,K.Abid,A.Mansoor,A.Adnan and K.K.Muhammad, “Information collection centric tech-

niques for cloud resource management:Taxonomy, analysis and challenges,” Journal of Network and Computer Appli cations, vol. 100, pp. 80–94, 2019.

W.-T. Tsai, Z. Jin, and X. Bai, “Internetware computing: issues and perspective,” in Proceedings of the First Asia Pacific Symposium on Internetware. ACM, 2009.

H. Raj, R. Nathuji, A. Singh, and P. England, “Resource management for isolation enhanced cloud services,” in Pro ceedings of the ACM workshop on Cloud computing secu rity. ACM, 2009, pp. 77–84.

V.Chang and G. Wills, “A model to compare cloud and non-cloud storage of big data,” Future Generation Comput er Systems, vol.57, pp.56–76, 2016.

R. Kumar and A. K. Bose,“Internet of things and opc ua,” ICNS 2015, p.52, 2015.

S. Kamara and K. Lauter, Cryptographic Cloud Storage. Canary Islands, Spain: Springer Berlin Heidelberg, January 25-28 2010, pp. 136–149. [Online]. Available: http://dx.doi.org/ 10.1007/978-3-642-14992-4$_$13

J. Ateeqa, B. Afzal, and R. Tauseef, “Sla based infrastruc ture resources allocation in cloud computing to increase iaas provider revenue,” Research Journal of Science and IT Management, vol. 4, no. 3, pp. 37–44, 2015.

P. Rajanetal.,“Evolution of clouds to rage as cloud compu ting infrastructure service,” arXivpreprintarXiv: 1308.1303, no.1, 2013.

R.Ghani-Ur, G.Anwar, Z.Muhammad, A. N. Syed Husnain and S. Dhananjay, “Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov),” IEEE Access, vol. 7, pp. 109 026 – 109 037, 2019.

N. Kaaniche and M. Laurent, “Data security and privacy preservation in cloud storage environments based on cryp tographic mechanisms,” Computer Communications, vol. 111, pp. 120–141, 2017.

Sahai and B. Waters, “Fuzzy Identity-Based Encryption”. Aarhus, Denmark: Springer Berlin Heidelberg, May 2005, pp. 457–473.

E.-J.Goh, H.Shacham, N.Modadugu and D.Boneh, “Sirius: Securing remote untrusted storage.” in NDSS, vol.3, 2003, pp.131–145.

Z. Kartit, A. Azougaghe, H. K. Idrissi, M. El Marraki, M. Hedabou, M. Belkasmi, and A. Kartit, “Applying encryp tion algorithm for data security in cloud storage,” in Ad vances in Ubiquitous Networking. Springer, 2016, pp. 141– 154.

D.Pritamand, M.Chatterjee, “Enforcingrole-based access control for secure data storage in cloud using authentication and encryption techniques,” Journal of Network Communi cations and Emerging Technologies (JNCET), vol. 6, no. 4, 2016.

L.Zhou, V.Varadharajan and M.Hitchens, “Enforcing role based access control for secure data storage in the cloud,” The Computer Journal, p. bxr 080, 2011.

V.Chang and M.Ramachandran, “Towards achieving data security with the cloud computing adoption framework,” IEEE Transactions on Services Computing, vol. 9, no. 1, pp. 138–151, Jan 2016.

C.W.Chang,P.Liu,andJ.J.Wu,“Probability-based cloud stor age providers selection algorithms with maximum availabil ity,” in 41st International Conference on Parallel Pro cessing, Sept 2012, pp. 199–208.

B.Mao, S.Wu and H.Jiang, “Exploiting work load charac teristics and service diversity to improve the availability of cloud storage systems,”IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 7, pp. 2010–2021, July 2016.

Downloads

Published

2021-05-30

How to Cite

Cloud Storage Architecture: Issues, Challenges and Opportunities . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(3), 70–73. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11490