International Journal of Advanced Computer Technology (IJACT)ISSN:2319-7900download this template and replace the content with the textof your manuscript.Advantages and Disadvantages of Cloud Comput<strong>in</strong>gStart<strong>in</strong>g from t<strong>in</strong>y corporations to huge organizations, the<strong>in</strong>vestment value is saved [23, 24, 36, 42] by avoid<strong>in</strong>g thehardware purchase, hardware ma<strong>in</strong>tenance, pricy softwaresystem license, software system ma<strong>in</strong>tenance, cool<strong>in</strong>g products,storage and backup devices, value <strong>for</strong> electricity usage,operational value, upgrad<strong>in</strong>g value etc. Apart from this valuesaved, the <strong>cloud</strong> has few other advantages like high responsibilityand convenience, backup and recovery, device& location <strong>in</strong>dependence, easy accessibility to <strong>in</strong>fo and fastpreparation. All these advantage makes the <strong>cloud</strong> comput<strong>in</strong>ga grand success. Cloud has several benefits and conjo<strong>in</strong>tly ithas few disadvantages. The two big disadvantages of <strong>cloud</strong>are; Technical Problems and Security. Even though the<strong>cloud</strong> offers a lot of facility to the users and build their lifestraight<strong>for</strong>ward, some technical problems might produce<strong>in</strong>convenience to the users. To access the <strong>cloud</strong>, Internetusage is should and there<strong>for</strong>e the problems associated withthe network might have an effect on the per<strong>for</strong>mance of the<strong>cloud</strong> severely. If the user uses <strong>mobile</strong> devices then severalreasons like signal strength, Bandwidth, battery backup andfrequent handoff might degrade the per<strong>for</strong>mance of the<strong>cloud</strong> dramatically [47, 48]. The security could be a hugedownside with<strong>in</strong> the <strong>cloud</strong> comput<strong>in</strong>g. Because, all the sensitive<strong>in</strong><strong>for</strong>mation’s of an organization or company shouldbe transferred over the Internet which might be a big risk.As shown <strong>in</strong> figure 1, the <strong>clients</strong> are ambiguous <strong>in</strong> choos<strong>in</strong>gwhether the <strong>cloud</strong> is used or not, s<strong>in</strong>ce <strong>cloud</strong> has both benefitsand downsides. Cloud helps the client to scale back theoperational value, preparation time and ma<strong>in</strong>tenance value.This reason makes the <strong>cloud</strong> comput<strong>in</strong>g a preferred one andplenty of corporations shifted to the <strong>cloud</strong> usage. Howeverthe large issue with<strong>in</strong> the <strong>cloud</strong> comput<strong>in</strong>g is lack of managementand security. For this security downside, extra solutionsneed to be developed to <strong>for</strong>m the <strong>cloud</strong> comput<strong>in</strong>g agrand success with<strong>in</strong> the future.Figure 1: Cloud advantages and disadvantagesLiterature SurveyInternet is act<strong>in</strong>g as a lane, where various technologiesdrive on it. Out of that <strong>cloud</strong> is the most recent technologyand almost all the large scale organizations enter <strong>in</strong>to it. The<strong>cloud</strong> has too many advantages as discussed <strong>in</strong> the previoussection and out of that, hardware and ma<strong>in</strong>tenance cost, accessibilityaround the globe, flexibility and highly automatesprocess are most important <strong>for</strong> the <strong>clients</strong>, s<strong>in</strong>ce the hardwareor software up gradation seem to be a everyday headache<strong>for</strong> the <strong>clients</strong>.The execution environment required <strong>for</strong> a client to developa web based application requires expensive hardware andsoftware support and this may require more time to setup.But by us<strong>in</strong>g the <strong>cloud</strong> one service can cont<strong>in</strong>ue his workwithout the expensive purchase and time consum<strong>in</strong>g setupby us<strong>in</strong>g PaaS of the <strong>cloud</strong> [7, 8, 17]. The <strong>in</strong>frastructure andexecution environment can be used by many <strong>clients</strong> simultaneouslyand managed by third party [10, 11, 18, 23].To make everyth<strong>in</strong>g (Services) possible, available, manageableand reusable <strong>in</strong> the <strong>cloud</strong>, the virtualization techniqueplays a vital role. A s<strong>in</strong>gle server <strong>in</strong> the <strong>cloud</strong> can provideINTERNATIONAL JOURNAL OF ADVANCE COMPUTER TECHNOLOGY | VOLUME 2, NUMBER 354
International Journal of Advanced Computer Technology (IJACT)ISSN:2319-7900multiple services <strong>in</strong> parallel to huge number of <strong>clients</strong> viathe virtualization technique [12, 13, 23]. The tools likeVMWare, Micorsoft Virtual PC, VirtualBox, Parallels, QE-MU etc. helps <strong>in</strong> virtualization of Operat<strong>in</strong>g Systems. The<strong>cloud</strong> enables the centralization of resources, which is unsafes<strong>in</strong>ce the chances <strong>for</strong> cyber attacks <strong>in</strong>creases. The possibility<strong>for</strong> the attack is more <strong>in</strong> <strong>cloud</strong> side because, the user of the<strong>cloud</strong> needs to send his identity over the Internet frequently<strong>for</strong> access<strong>in</strong>g the services.The data security is also a challeng<strong>in</strong>g issue <strong>in</strong> <strong>cloud</strong>comput<strong>in</strong>g s<strong>in</strong>ce all the data of an <strong>in</strong>dividual or organizationare centralized and kept <strong>in</strong> remote servers [14, 15, 19]. Toensure the data security, the strong encryption algorithmshas to be developed to overcome the security threads on storagesecurity. The <strong>cloud</strong> service provider has to limit theaccess over the file by allow<strong>in</strong>g few actions related to manag<strong>in</strong>gthe files without any strict process and should be strict<strong>in</strong> actions like updat<strong>in</strong>g, read<strong>in</strong>g and delet<strong>in</strong>g of file. Thiswill optimize the per<strong>for</strong>mance as well as security. To keepthe <strong>cloud</strong> runn<strong>in</strong>g smoothly, the multi level security is compulsoryat various levels i.e., network level [16], host level[25] and application level [14, 26, 27]. The basic securitymodels such as SQL Injection attack prevention, Cross SiteScript<strong>in</strong>g (XSS) attack prevention, Man <strong>in</strong> the Middle attackprevention [20, 21, 32, 32, 37, 44] are not sufficient <strong>for</strong> the<strong>cloud</strong> to run seamlessly.In the Internet, it is common to have denial of service attacks[2, 3, 4, 18, 22, 23, 28] and cookies poison<strong>in</strong>g attacks[43]. To dist<strong>in</strong>guish the human and mach<strong>in</strong>e virus <strong>in</strong> theInternet, the concept of captcha [5] was used by most of theservers. but recent virus and spams have the ability to breakthe captcha. So it is clear that, cont<strong>in</strong>uous research <strong>in</strong> thisfield is must to protect the future Internet oriented services.It is true that certa<strong>in</strong> loopholes <strong>in</strong> the architecture makethe <strong>cloud</strong> comput<strong>in</strong>g vulnerable to the security threads <strong>in</strong>high probability [45, 46]. There is no guaranty that the<strong>cloud</strong> service provider could ma<strong>in</strong>ta<strong>in</strong> our files on a s<strong>in</strong>gleserver or storage. The files may be split <strong>in</strong>to many parts anddistributed over multiple servers to improve the speed viaparallelism. This scenario makes the <strong>cloud</strong> more vulnerableto the security related threads.Apart from security, <strong>cloud</strong> has other disadvantages likeper<strong>for</strong>mance, latency [29] and reliability [24, 39]. The reason<strong>for</strong> the latency, poor per<strong>for</strong>mance and unreliability <strong>in</strong> theservices is as follows;a) The complicated or time consumable encryptionand decryption algorithms used <strong>in</strong> the <strong>cloud</strong> comput<strong>in</strong>genvironment.b) The unreliable and low bandwidth Internet connectivity.c) Unreliable network with high conjunction andpacket losses.d) Allow<strong>in</strong>g too many users to access the servicesbeyond the limit because of high demand from theclient’s side.e) Mobile <strong>clients</strong> runn<strong>in</strong>g with extremely high shortageof resources.However from the survey we can say that, even after severalresearch and development the security and file <strong>in</strong>tegrityproblems are keep on persist <strong>in</strong> the Internet based services,specifically on the <strong>cloud</strong>. So we need different solutions <strong>for</strong>different situations and requirements over time.File Integirity ModelCheck<strong>in</strong>g file <strong>in</strong>tegrity is a challeng<strong>in</strong>g task <strong>in</strong> <strong>cloud</strong> comput<strong>in</strong>g.In the classical method <strong>for</strong> check<strong>in</strong>g the correctnessof a file the client has to ma<strong>in</strong>ta<strong>in</strong> a copy to compare thereceived copy. This is mean<strong>in</strong>gless, because if the client hasenough storage to store the data <strong>in</strong> the local system, then it isnot necessary to use the <strong>cloud</strong> service to store the file <strong>in</strong> remotelocation. The <strong>clients</strong>, those are not hav<strong>in</strong>g enough resourcesalone may prefer the <strong>cloud</strong> services.From the literature we can have hundreds of file <strong>in</strong>tegritymodels which are suitable <strong>for</strong> <strong>cloud</strong> storage service. Somemodels are lack <strong>in</strong> provid<strong>in</strong>g security and few are poor <strong>in</strong>per<strong>for</strong>mance. Also, some of the exist<strong>in</strong>g models are good <strong>in</strong>security but poor <strong>in</strong> execution time. The methods should becompact enough to run smoothly on the light weight <strong>mobile</strong>devices, s<strong>in</strong>ce most of the <strong>cloud</strong> <strong>clients</strong> are <strong>mobile</strong> <strong>in</strong> therecent years.Our proposed model of file <strong>in</strong>tegrity is as follows. Theentire file has to be split <strong>in</strong>to number of macro blocks(M1,M2,M3,M4, …, Mn). All the macro blocks should be ofunique size. If the Last block conta<strong>in</strong>s no sufficient bits to<strong>for</strong>m the block with fixed size, then padd<strong>in</strong>g bits can bemerged with the orig<strong>in</strong>al data. Each Mi should be processedand the correspond<strong>in</strong>g hash code has to be generated us<strong>in</strong>gour proposed method.ENABLING SELF AUDITING FOR MOBILE CLIENTS IN CLOUD COMPUTING55