THE ERA OF CLOUD COMPUTING: A RECENT SURVEY

Apurva Saxena
2019 International Journal of Advanced Research  
Cloud computing an emerging technology provides various services to the users like infrastructure, hardware, software, storage etc. For working cloud in data security, it is necessary that cloud computing network should always be free from outside attack/ threats. Here in this paper we focused on the cloud computing era needs, applications, issues and challenges and also tried to propose some of the good solutions which can be implemented to resolve them. Authors also tried to discuss different
more » ... o discuss different types of cloud and their providers with current scenario of cloud computing which pave the way to forecast its basic way to future. The service of cloud like IaaS (Infrastructure as a Service) allows an internet trade a way to build up and produce on demand.PaaS (Platform as a Service): It is the client who controls the applications that run in the environment, but does not manage the operating system, hardware on which they are running. Need of cloud computing is an expertise uses the internet and central remote servers to maintain data and applications. Some reasons are Speedy Elasticity, Measured Service, on-Demand Self-Service etc. Cloud computing is also known as fifth generation of computing after supercomputer, Personal Computer, Client-Server Computing, and the Web. One of the issues of cloud computing is data security in which data can be loss or hacked by the attacker, possible solution of this problem by applying encryption techniques on the data. Some challenges are also present in cloud computing like lack of resources in which staff needed new skills or updated knowledge related technology, possible solution is to recruit new staff or give training to the existing ones. This survey of cloud computing concluded that Cloud computing is increasing part of IT and many gigantic organizations are going to implement cloud computing. In the near future work on data science, artificial intelligence and machine learning service inside cloud provider to protect the customer sensitive data from the intruders attack.
doi:10.21474/ijar01/9022 fatcat:72goqtalqzatdk3ftdijnwkgmm