Figure 2 - uploaded by Qusay Kanaan Kadhim
Content may be subject to copyright.
Cloud Computing System Architecture 

Cloud Computing System Architecture 

Source publication
Article
Full-text available
Cloud Computing is seen as greatly accessible computing resources as an outward service granted from the world wide web. As an economical view, the cloud computing key is that consumers are free to use whatever they want, and pay for the services they want. The accessibility of the resources from the cloud is obtainable whenever users want and wher...

Similar publications

Article
Full-text available
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography. To cope with the constraints, security systems must choose between time cost and security. Cyber-attack model evolution and quantum computing technologies have severely limited c...

Citations

... NIDS are a crucial component of network security infrastructure [40]. They are designed to identify and respond to malicious activities or unauthorised access attempts within computer networks. ...
Article
Full-text available
Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta‐analysis to provide an in‐depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS‐based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.
... The data storage model is computing which considers as a web-based generation which utilizes remote servers. Author gives new designing for the information security storage construction where information encrypted and divided into many blocks and distributed between services suppliers instead of relying on one supplier for information storage [16]. ...
Article
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. User’s data is stored in large database. The stored data can be accessed and modified by the clients over the Internet. The data is monitored by the Third Party Auditor (TPA) on behalf of the client. Therefore, integrity is lacked by the data stored on the servers. The data integrity is ensured by the cloud services that provide trust to the privacy of users. Aiming at the urgent problem of network data security in cloud computing operations, this paper proposed a security situation assessment system to grasp the security situation in real time. A set of cloud computing network data storage security is proposed. Through this model, the extraction of network data storage security situation elements, the design of network data storage security situation assessment scheme and the calculation method of network data storage security situation value are completed. The experimental results show the error of the predicted value obtained by the network data storage security situation assessment system. The effectiveness of the system model and the superiority of the improved algorithm is verified by the experimental results. This paper uses the cloud model to predict the cloud computing network security situation. On the other hand, the security situation value obtained by the situation assessment process can be used directly without training the original situation value. Performance improvement by the proposed technique over existing technique is seen and it is observe that the proposed technique is 23% and 34% better than the existing techniques.
... The cloud storage framework requires an input layer, an interface layer. There have been debates about the combination of cloud storage and private cloud (Qusay et al., 2018). It suggested structure of cloud storage, concealing hardware and software complexities from its operators. ...
Article
Full-text available
Article History Cloud Computing (CC) is regarded as a worldwide outward-looking infrastructure that is highly open to computers. The key to CC, in economic terms, is that customers are free to use whatever they want and pay for the services they want. The accessibility of cloud resources can be achieved whenever users want and wherever they are. Users are therefore free to buy the IT service they want, and they do not have to worry more about how sustainable things can be beyond their positions. Users can use services in other ways by simply plugging into the cloud and only paying for what they use. All these features have become very useful and challenging for cloud computing. However, data privacy is a key security problem in CC which involves data integrity, privacy, and user privacy. Most people do not prefer cloud data to be saved because they are worried that their sensitive data will be lost. This study aims to recognize various issues of cloud computer data protection and architecture for secure cloud storage such that personal data are encrypted and divided up into some cipher blocks and spread between different websites of services providers instead of relying exclusively on a single data storage provider.
... A product provided by the cloud meets the consumer's needs and is conscious of the problems involved in using this service. It also allows clients and companies to use applications without installation and access their files and information in any zone of the world with the assistance of the Internet [13], [14]. ...
Article
Full-text available
The emergence of several computing paradigms, the most recent cloud computing, has resulted from significant technological advances in the information and communication technologies (ICT) sector in the last decades, with the most significant improvements in internet services and virtualization techniques. Individuals and businesses may access various cloud services and solutions from some big cloud service providers worldwide. As a result, more businesses are migrating to the cloud, causing the cloud services industry to expand. Organizations can profit from cloud technology in various ways, but there are also dangers and issues connected with this phrase. Cloud computing is a way to improve Ecommerce by making it easier for people to buy and sell things. This paper explains the concept and features of cloud computing and how cloud computing can help Ecommerce.
... A two-factor authentication confirmation will occur when the thief plays one of the two keys since he will need the other key. This means that performing a two-factor authentication on the door [10]. Nonetheless, the door locks can be broken without a key when the technology is used. ...
Article
Full-text available
p class="0abstract"> This paper researches the evolution process of what is called two-factor authentication technique and its adaptation related to the educational system through the Internet. This technique is a measure of security employed, particularly in scopes which have valuable information like bank services. It witnesses developments so far as today, in parallel with the developments occurring in technology. Since this technique consists of two phases, the security is going to be developed. Today, bank services, devices using the Internet of things, tickets of public transportation and lots of other scopes are utilized. In the information field, the researchers and scientists always update the techniques of two-factor authentication to resist the attacks related to security. Last years, the researchers studied novel technologies like behavioral biometric or biometrics. The training through the Internet may become much more useful than going to someplace to study a specific course. Mostly, the participants in the trainings through the Internet get many certificates for success, participation, etc. The principal problem is how to certify the truthiness of the participant who desires to get the certification. In this paper, and by researching the techniques of two-factor authentication, the Mimic Control Method with Sound Intensity (MCMSI) is proposed to be used for the training through the Internet.</p
... Providing the user with services for cloud computing services, providing a product that meets the needs of the user and is aware of the problem involved in the use of this service provided. Therefore, the services provided are developed by tracking cloud networks and analysing applications and services provided by the cloud to users [12]. Additionally, cloud computing service provides better compatibility, scalability and network connectivity on demand for many computing resources including servers, cloud network components, operating systems, software applications, cloud virtualization resources (sharing and pooling resource), and cloud services [13]. ...
... The service provider provides information upon request to resolve the cloud from another service provider [24].The implementation use of automated version controls reduces risk in cloud computing [12]. In addition, cloud infrastructure is a combination of two or more clouds private, community or public [39]. ...
Article
Full-text available
Cloud computing is a popular paradigm in information technology and computing as it offers numerous advantages in terms of economical saving and minimal management effort to many organizations agencies. Although elasticity and flexibility brings tremendous benefits, it still raises many information security challenges that have created a barrier against adopting this agile Cloud computing. This paper provides a review study on the cloud computing as well identifying 25-key factors to fulfil better practice in cloud computing and way of making the environment of the cloud computing more qualified to many organizations agencies.
... The best framework for evaluating security issues for cloud computing is security risk management for self-assessment of user requirements and cloud computing service providers can continuously monitor and understand user requirements well and provide reassurance between users and vendors through the cloud risk management framework [11]. Additionally, it presented the security model for secure in cloud computing environments that identifies and classifies security requirements, attacks, threats, concerns related deployment and services of the cloud computing models [12]. ...
... Indeed, a critical understanding of the cloud security issues of the technical mechanism to avoid these potential security issues in the services provided rather than an advantage. Security problems are among the most important challenges facing computing technology and knowledge and assessment of threats that make them secure [12]. ...
Article
Full-text available
computing is very important. Therefore, the methods and approaches for controlling cloud security issues are important to mitigate the issues. In addition, this paper identified and categorized cloud computing security issues across all components of cloud applications and mobility; the cloud services model and cloud deployment models. These problems will verify and modeled by using fuzzy multiple regression model analysis methods. The process of data analysis through regression model and other techniques that are important to confirm the validity and the reliability of data analysis. Will present data analysis conceptual modeling for analysis security issues and structural model for fuzzy multiple regression analysis in cloud computing security issues. Also in this paper provides a clear classification about cloud security issues and critical control factors that mitigate cloud computing issues. The fuzzy multiple regression analyses the existing models in cloud security issues using intelligent model to find out the appropriate cloud control factors for each cloud security issues from estimation regression analysis for address the security. On the other hand privacy-related could computing security issues inherent from the cloud computing to adopting performance, accelerate fabrication and the ability to run down applications.
... In regards to the network topology, the two-tier network architecture is common in cloud nowadays, where access switches/routers depend on switching and routing functionalities provided by aggregation switches/routers. This architecture has many advantages; the design becomes simpler as only a few switches/routers can be sufficient, and thus, the network latency and aggregate power consumption can be reduced (Kanaan, Mahdi and Ail, 2018). Nevertheless, this architecture presents limited scalability. ...
Article
Full-text available
Nowadays, cloud computing has rapid development over the Internet, especially in areas that involve high demands on a large scale of network computing such as IT. Sharing of resources is the main aim of cloud computing where processing service and network bandwidth needed to access it should be allocated concurrently. A general overview of the cloud computing environment and its significance is presented. The paper discussion on the shortcomings of the fundamental design and performance issues of Transmission Control Protocol (TCP) Incast, Outcast in cloud networks.
... Recent adoption of cloud computing on a large scale in the field of industries and organizations because of their usability service-oriented models are simple cloud. Ability cloud the quantum of users to access cloud services to hold systems secure and daily growing in cloud medium [3]. The multiplicity of computing technology is valuable by government institutions and other institutions. ...
Article
Full-text available
Cloud computing has become a promising platform in networking for infrastructure pattern, which can help deploy large-scale application in a very cost effective method, it has several weaknesses that are associated with several stages of its operation, especially in security, which are; vary from one sector to another. Because the literature still lacks to sufficient studies about the control factors for cloud computing issues generally and in the government institutions particularly, this review study provides a wide understanding about the critical factors for cloud computing control. The finding of this study highlights 26 control factors that mitigate the cloud computing issues.
... Recent adoption of cloud computing on a large scale in the field of industries and organizations because of their usability service-oriented models are simple cloud. Ability cloud the quantum of users to access cloud services to hold systems secure and daily growing in cloud medium [3]. The multiplicity of computing technology is valuable by government institutions and other institutions. ...
Article
Cloud computing has become a promising platform in networking for infrastructure pattern, which can help deploy large-scale application in a very cost effective method, it has several weaknesses that are associated with several stages of its operation, especially in security, which are; vary from one sector to another. Because the literature still lacks to sufficient studies about the control factors for cloud computing issues generally and in the government institutions particularly, this review study provides a wide understanding about the critical factors for cloud computing control. The finding of this study highlights 26 control factors that mitigate the cloud computing issues.