Cloud Computing and Data Security Challenges: A Nepal Case

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-3
Year of Publication : 2019
Authors : Shailendra Giri
DOI :  10.14445/22312803/IJCTT-V67I3P128

MLA

MLA Style: Shailendra Giri "Cloud Computing and Data Security Challenges: A Nepal Case" International Journal of Computer Trends and Technology 67.3 (2019): 146-150.

APA Style:Shailendra Giri (2019). Cloud Computing and Data Security Challenges: A Nepal Case. International Journal of Computer Trends and Technology, 67(3), 146-150.

Abstract
Cloud computing is being an alternate choice of computer and mobile users for the data storage and access. Cloud computing and data security both are being major issues in Nepal. The author is trying to explorer about cloud computing and data security in cloud. The content analysis method is used to conduct the study. The study concludes that the cloud computing is essential for Nepal means of data accessible, regulation and storage. Nepal is under developed country as well it has not sufficient technological knowhow, sufficient financial resources, huge digital divide, and skilled human resources so the data security issue is genuine in this time. The storage, virtualization, and networks are the major security concerns in Cloud Computing. Virtualization allows multiple users to share a physical server is one of the key concerns for cloud users and providers. Cloud networks are in target for attacks particularly while communicating with remote virtual equipment basically their target in data. It is clear that Nepal is facing many challenges in cloud computing are securities, storage, data centre operation, costing model, charging model, service level agreement, locality, integrity, access, segregation, breaches and confidentiality. Nepal is one of the developing country, it should start to use own sever and satellite for communication as well as data centre or data bank.

Reference
[1] A.Leinwand, (2009)."The Hidden Cost of the Cloud: Bandwidth Charges," http://gigaom.com/2009/07/17/the-hidden-cost-of-the-cloud-bandwidthcharges
[2] Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/
[3] Baburajan, R. (2011). "The Rising Cloud Storage Market Opportunity Strengthens Vendors". http://it.tmcnet.com.
[4] Bele, S. B (2018). A Comprehensive Study on Cloud Computing. International Journal of Information Research and Review. Vol. 05, Issue, 03, pp.5310-5313
[5] Cloud Computing: Clash of the clouds", 2009. The Economist. www.economist.com.
[6] Cloud Security Alliance (2010). Top Threats to Cloud Computing V1.0. Available: https://cloudsecurityalliance.org/research/top-threats
[7] Conti, Marco, (2011)."Research challenges towards the Future Internet”, Computer Communications, 34(18), 2115–2134
[8] For a detailed analysis of NRENs in Europe and their role, see the documents (in particular the TERENA compendium), http: / /www.terena.org/publications/
[9] Google App Engine. http://code.google.com/appengine. Retrieved : 9 February, 2019.
[10] Grumman, G. (2008). What cloud computing really means". InfoWorld. Retrieved: 10 February, 2019.
[11] Hashizume (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications .
[12] http://cloudsecurity.org/2008/10/14/biggest-cloud-challenge-security, retrieved 29 Feb 2019.
[13] http://computinginthecloud.wordpress.com/2008/09/25/utility-cloud-computingflashbackto-1961-prof-john-mccarthy, retrieved 5 Jan 2019.
[14] http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
[15] Ju J, Wang Y, Fu J, Wu J, Lin Z (2010). Research on Key Technology in SaaS. In: International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China. IEEE Computer Society, Washington, DC, USA, pp 384–387
[16] Koslovski G., Huu T. T., Montagnat J., & Primet P. V.-B, 2009. First International Conference, CloudComp 2009. Munich, Germany, October 19-21.
[17] Kumar., V., Chaisiri, S. ,Ko.R.(2017). Data Security in Cloud Computing. The Institution of Engineering and Technology. Published by The Institution of Engineering and Technology, London, United Kingdom.
[18] Li Henry (2009). Introduction to Windows Azure An Introduction to Cloud Computing Using Microsoft Windows Azur. Printed and bound in the United States of (America Mustafa S.2015). Resource management in cloud computing: Taxonomy, prospects, and challenges. Computer Electrical Engineering, http://dx.doi.org/ 10.1016/j.
[19] National Institute of Standards and Technology, (2011). The NIST definition of cloud computing; http://www.nist.gov/itl/cloud/ upload/cloud-def-v15.pdf
[20] Oestreich, Ken, (2010). "Converged Infrastructure". CTO Forum. Thectoforum.com.
[21] Popovic K, Hocenski Z. (2010). Cloud Computing Security issues and challenges. In: Proceedings of the 33rd International convention MIPRO. IEEE Computer Society Washington DC, USA, pp 344–349
[22] Rittinghouse John W. & Ransom James F. (2010). Cloud Computing Implementation, Management, and Security. CRC Press Taylor & Francis Group. Boca Raton London- New York
[23] Rittinghouse JW, Ransome JF (2009). Security in the Cloud. In: Cloud Computing. Implementation, Management, and Security, CRC Press
[24] Sarana David E.Y. Implementing and Developing Cloud Computing Applications. CRC Press. Auerbach Publications Taylor & Francis Group. USA
[25] Subashini S, Kavitha V. (2011). A survey on Security issues in service delivery models of Cloud Computing. Netw Comput Appl 34(1):1–11
[26] Viega J.(2009) Cloud Computing and the common Man. Computer 42(8):106–108
[27] Villasante Jesus (2009). Cloud Computing Enabling the Future Internet. First International Conference, CloudComp 2009. Munich, Germany, October 19-21.
[28] Walther Dane S.(2009). Akamai and Cloud Computing. First International Conference, CloudComp 2009. Munich, Germany, October 19-21.
[29] www.gartner.com/technology/initiatives/cloud-computing.jsp. [30] Y. Chen, V. Paxson, and R. Katz, (2010). "What’s New About Cloud Computing Security?

Keywords
Cloud computing, data security challenges, security model, vulnerabilities, e-government.