an analysis scientometric for challenge growth and development of cloud computing

G. Geetharamani,M.Padma

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:3         Issue:1         Year: 26 December,2014         Pages:116-129

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

In recent years, the rapid growth and popularity of cloud computing with the knowledge to achieve this research has led to a large amount of publications. Due to the interdisciplinary nature of cloud computing research and high relevance, it approaches the overall construction and development in this field without understanding becomes increasingly difficult or even impossible. When the assessment is a long tradition in many fields of science, in the area of cloud computing, we identified the lack of a comprehensive scientometric analysis. Based on a large bibliographic database, a view from above the clouds, this study empirically study the state of evolution and scientometric methods applicable to cloud computing research. Thus, we output formats, research productivity, and research impact and provide detailed insights. Furthermore, we explain the main clusters by analyzing the relevant sub-topics to explore. The results of this study, research-driven knowledge sharing and collaboration in the area of research into cloud computing in terms of patterns, trends and other key factors to provide a better understanding of sharing knowledge and collaborating in the area of cloud computing research. Participants in security issues also have to benefit from some advantages of Cloud Computing. It focuses on many advantages, like network performance management and other threat response, the timeline of improvisation, intelligent scaling of collecting evidence and differentiation of market resources audit, management and the sequence of the violation of security including better risk level, security of this concentration of resources, information is centralized and updates despite production problems and hair loss , incident response, password control tests, safety, building security software. This research explained some of the benefits of Cloud Computing, including the state of security and the best evidence.

Kewords

Cloud Computing, Cloud Security, Cloud Privacy Issues, Cloud Computing in India.

Reference

[1] R. Buyya et al., "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, no. 6 pp. 599-616, 2009. [2] S. Subashini, and V. Kavitha. "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, (2011). [3] T. Ristenpart, et al., "Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds," Proc. 16th ACM Conf. Computer and Communications Security (CCS 09), ACM Press, 2009, pp. 199–212 [4] S. Yu, et al., "Achieving Secure, Scalable, and Fine-Grained Access Control in Cloud Computing,"Proc. 30th IEEE Int'l Conf. Computer Communications (INFOCOM 10), IEEE Press, 2010, pp. 534–542. [5] A. Bakshi and B. Yogesh, "Securing cloud from ddos attacks using intrusion detection system in virtual machine," In Communication Software and Networks, 2010. ICCSN'10. Second International Conference on., pp. 260-264, 2010. [6] S. Pearson and B. Azzedine, "Privacy, security and trust issues arising from cloud computing," In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on., pp. 693-702, 2010. [7] H. X. F. Bingsi, "Cloud Computing: The Challenges to Library Management," Journal of Academic Libraries, vol.4, no. 2009, 2009. [8] D. Catteddu and G. Hogben, "Cloud Computing: benefits, risks and recommendations for information security," European Network and Information Security Agency, Tech. Rep., 2009. [9] [10] M. Almorsy et al, “Collaboration-based cloud computing security management framework," In Cloud Computing (CLOUD), 2011 IEEE International Conference on., Washington DC, 2011, pp. 364-371. [11] D. Strom, Shopping Around for Cloud Computing Services, Data Center and Virtualization Media Group TechTarget Inc., pages 3-7, Vol. 1, No. 1 June 2011. [12] L. Young, What to Consider When Evaluating Cloud Computing, ISACA Journal Vol. 16, 2011, http://www.nist.gov/ [13] L. Young, What to Consider When Evaluating Cloud Computing, ISACA Journal Vol. 16, 2011, http://www.nist.gov/ [14] D. Chiu, Elasticity in the Cloud, www.acm.org/crossroads, /Vol. 16, No. 3, pages 3-4, 2010 Microsoft Research, "Securing Microsoft's Cloud Infrastructure, " in White Paper, 2009, http://www.globalfoundationservices.com/security/ documents/SecuringtheMSCloudMay09.pdf