The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.30534/ijatcse/2019/18822019
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing: Review on Recent Research Progress and Issues

Abstract: The current trend of research in cloud computing is challenging and keenly marginal to understand for the researchers and the learners due to its over-cover and complementary nature towards the new technologies. Cloud Computing is part and parcel of its applications with a majority of the extending concepts of Fog Computing, Internet of Things (IoT) and Big Data Analytics. In the current scenario, it is difficult for a researcher to identify the domain applicability and interrelationship among all the specifie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…In addition to handling heavy transactional workloads in companies and organizations, SQL DBMSs in general, provide more security features than their NoSQL counterparts, this may be attributed to the fact that NoSQL DBMSs are still relatively new compared to SQL DBMSs. In the future, following the sporadic advancements in Cloud and IoT deployments [37][38] coupled with data processing requirements, it is believed that the security model of NoSQL platforms would advance to such a level that it can substantially compete with or outweigh the best security provisions in the best commercial SQL DBMSs available. In each case, it may be submitted that the greatest threat to database base security is the human factor.…”
Section: Discussionmentioning
confidence: 99%
“…In addition to handling heavy transactional workloads in companies and organizations, SQL DBMSs in general, provide more security features than their NoSQL counterparts, this may be attributed to the fact that NoSQL DBMSs are still relatively new compared to SQL DBMSs. In the future, following the sporadic advancements in Cloud and IoT deployments [37][38] coupled with data processing requirements, it is believed that the security model of NoSQL platforms would advance to such a level that it can substantially compete with or outweigh the best security provisions in the best commercial SQL DBMSs available. In each case, it may be submitted that the greatest threat to database base security is the human factor.…”
Section: Discussionmentioning
confidence: 99%
“…In addition to the overhead generated by the scan, IP addresses are usually dynamic and the requirement to login for identification is not possible, given that the DDoS attack may make an identification operation impossible. In [9], [21], attacks are dealt with by creating a new instance of the application. Once a DDoS attack is detected, the proposed mechanism seeks to identify the attackers through PINGs: if a client suspected of being an attacker does not respond to the PING, he is considered as an attacker, not being redirected to the new instance of the application.…”
Section: Related Workmentioning
confidence: 99%
“…[8] proposed a secure and efficient mutual authentication concept for an edge-fog-cloud network architecture to mutually authenticate fog client computing at the edge of the network, with the fog servers at the fog layer. This author required a client in the network to hold only one long-term master secret key, which allows verifying a communication with any client in the fog server of the network, with a fully authenticated direction [24].…”
Section: √ √ √mentioning
confidence: 99%