Sie sind auf Seite 1von 11

ISSN: 2312-7694

Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)

A Survey on Cloud Computing Application & Its Testing


Methodologies
Summaya Iqbal
Fatima Jinnah Women University
Rawalpindi, Pakistan
Sumaya.iqbal06@yahoo.com

Nadia Khan
Fatima Jinnah Women University
Rawalpindi, Pakistan
nadiakhanfjwu@gmail.com
Mehreen Sirshar
Fatima Jinnah Women University
Rawalpindi, Pakistan
msirshar@gmail.com

Abstract One of the emerging computing paradigm is Cloud


computing. It provides computing service, accessible through
internet on demand and also provides shared resources; servers,
networks, services, storage, and applications, without obtaining
them physically. Cloud computing provides different
opportunities for different testing departments. Cloud testing is
primarily a software testing where testing can be carried out
through using resources across cloud applications. Cloud Testing
control the cloud applications, drop the computing price, while
testing effectiveness increases. In modern era different companies
get real benefits through cloud computing. Due to increase in
demand of reducing cost cloud computing technique evolved and
become popular in market. Security in this field involves
different areas and issues. Many security mechanisms are to
protect cloud computing. A survey is presented in this paper for
cloud computing, which provides a better design description of
cloud computing applications, security, testing and challenges.

I.

INTRODUCTION.

Cloud computing is the generic term that provide services over


network. It can save the world because people can get
everything that they want from the cloud. In modern era
different companies who are seeking a competitive edge in
business market get real benefits through cloud computing [6].
It supports the high cost computing infrastructure for IT based
solutions. It provides a flexible architecture of IT, can be
accessible on portable devices through internet. Cloud
computing promotes a virtual, secure and economically
feasible IT solutions[1]. Cloud computing technology is still
on development stage. It provides many benefits but the
research communities are attracted through automatic resource
positioning, information security and energy management. It
provides shared resources; servers, networks, services, storage,
and applications, without obtaining them physically [7]. It also
allows users to implement and manage their applications over
the cloud which may contain virtual resources.

2014, IJCCSE All Rights Reserved

That is the place where cloud testing has appeared as a new


approach for testing, where environment of cloud computing
are grasped to reproduce a real world with applications
performance, security, speed and, functionality. Cloud testing
can be carried out through testing tools and also through cloud
services. This paper uses the testing concepts for enhancing
the cloud testing field. Cloud Testing control the cloud
applications, drop the computing price, while testing
effectiveness increases.
Cloud computing provides different opportunities for different
testing departments. Cloud testing is considered as a software
testing where testing can be carried out through using
resources across cloud applications. Due to increasing demand
of reducing computing cost cloud computing technique
evolved and become popular in market [12].
Organizations contain different testing departments that focus
on some challenges like meeting deadlines, test budget etc.
Testing is the last solution for serving a quality product [17].
Security in cloud computing involves different areas and
issues. Many security mechanisms are to protect cloud
computing systems. Researchers continue to develop new tools
of improving the security of cloud computing. Therefore, we
should develop new security techniques and older security
techniques should be thoroughly improved so we can work
with the clouds architecture more efficiently [9].
A. DEPLOYMENT
COMPUTING

MODELS

OF

CLOUD

Public Cloud: Cloud infrastructure and its applications made


available to the general public.
Private Cloud: Cloud infrastructure and its applications are
available only to some specific organization.
Hybrid Cloud: It is composed of both public and private cloud
that interoperates or federates through technology.

Vol. 02 No.01 February 2015

172 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)

Community Cloud: It is shared by several organizations and it


can also support a specific community.
Virtual Private Cloud: Cloud services that simulate the private
cloud experience in public cloud infrastructure.

One of the other aspects of the cloud computing is the social


aspect of it which remains left. What happens if smaller IT
companies start to provide their services on the cloud and no
one uses them? I believe that eventually everything would be
move to the Cloud. The question is that if users are ready for
such position then if it would be the right move and this need
must be addressed or not?

B. SERVICE MODELS
Software-as-a-Service (SaaS): It is a process by which
Application Service Provider (ASP) provide different software
applications over the Internet. It also helps the users to get rid
of installing, downloading, and operating the application on
their own computer. It also eliminates the software
maintenance load.
Examples: Google Apps
Platform-as-a-Service (PaaS): PaaS provides a computing
platform and solution stack as a service without software
downloads or installation for developers, end-users, or IT
managers. It provides an infrastructure for testing cloud
applications.
Examples: Force.com, Google App Engine, and
Microsoft Azure.
Infrastructure as a Service (IaaS): It is the sharing of
hardware resources which uses the Virtualization technology.
The primary objective of IaaS is to make resources such as
servers, storage, and network accessible to all applications and
operating systems. In the cloud infrastructure, the user does
not manage the hardware, but he has to control the operating
systems and deployed applications.
Examples: AmazonEC2, Amazon S3, Go Grid.
II.

CLOUD COMPUTING TECHNIQUES.

Cloud computing depends on internet technology where data


of client is stored and maintained in the data centre of a cloud
provider like Microsoft, Amazon, and Google etc. Different
software use cloud testing for testing purposes. Different
techniques for testing are developed for testing cloud. It is an
internet base technology which contain database of persons
that need to be secure. So several security mechanisms are
developed which involves different areas and issues. We have
conducted a survey for cloud applications and testing which
provides us detailed information about this technology and
several techniques applied on this.
A. Cloud Computing ( Nariman Mirzaei, 2008)
Cloud computing is an emerging effective and popular
computing paradigm. Leading industries such as Microsoft,
Google, and IBM offers their initiatives in promoting cloud
computing. Cloud computing provides on-demand IT services
and products. Big IT companies develop their own version of
cloud. But, still there are many questions which are
unanswered and most important of them are related to security.

2014, IJCCSE All Rights Reserved

B. Cloud Computing: Security Issues and Research


Challenges (Rabi Prasad Padhy et al, 2011)
Cloud computing provides computing service, accessible
through internet on demand and also provides shared
resources; servers, networks, services, storage, and
applications, without obtaining them physically. Cloud
computing is entirely dependent on internet technology where
data of client is stored and maintained in the data centre of a
cloud provider like Microsoft, Amazon, and Google etc. But
the limited control over the data may lead to various security
threats sand issues; insecure interfaces, data leakage, and
inside attacks. There are varied research challenges for
acquiring cloud computing for example managing Service
Level Agreement (SLA) which provides reliability,
interoperability and privacy. This paper highlights all the
issues regarding cloud computing for the improvement of
older techniques.
C. Towards a Cloud Computing Research Agenda (Ken
Birman et al, 2008)
Cloud computing is an Internet based development. Users
knowledge about this technology infrastructure (cloud) is not
much necessary, but its resources should be accessible to all
clients anytime, and from any platform (mobile phone, desktop
PC, mobile computing Platform).Main research themes on
traditional research agenda that emerge are: management in
power field, protocols to converge consistency, platforms
related to event notification and data sharing on large scale.
This paper presented the research agenda towards
interoperability and research challenges in cloud computing. A
small portion of this research space is owned by distributed
systems research.
D. Research on Mobile Cloud Computing: Review,
Trend and Perspectives (Abdullah and Han, 2012)
Mobile Cloud Computing (MCC) is the combination of mobile
computing and cloud computing. It achieves both the high
mobility and scalability. This paper highlights the principle of
MCC, recent research work, its characteristics, and also the
research trends for future. It analyses the infrastructure and
features of mobile cloud computing. MCC contains three main
optimization approaches, which considered the limitations of
mobile devices, division of applications services and quality of
communication. Mobile computing contains three major

Vol. 02 No.01 February 2015

173 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
concepts: hardware, software and communication, but these
should be transparent to clients. Mobile devices have been
widely accepted because it becomes the first choice of
working and entertainment for new generation in their daily
lives.
E. Cloud Computing Security Issues in Infrastructure as
a Service (Pankaj Arora et al, 2012)
Infrastructure as a Service (IaaS) supports the foundation layer
for the other delivery models, but the other delivery models
are affected by this layer due to lack of security, for instance,
PaaS, and SaaS that are built upon IaaS layer are highly
affected. This paper presents detailed study of IaaS
components and determines its security and weakness. Service
Level Agreement (SLA) should have very much importance.
There are attacks against XML and Web services the solution
proposed is to provide the Data Encryption mechanism. There
are Physical attacks against computer hardware the solution
proposed is to provide transparent cryptographic file systems.
Provide Firewalls Traffic Encryption for Port scanning DNS
security. The Security holes presented here which are
associated with IaaS implementation are also discussed in this
Paper.

H. An Advanced Survey on Cloud Computing and Stateof-the-art Research Issues (Mohiuddin Ahmed et al,
2012)
Cloud computing through flexible infrastructure provides
facilities to business entrepreneurs. It also facilitates the IT
industry. Users can share software, processing power,
bandwidth, memory and storage space through cloud
computing. Utility computing is turn into reality through the
advancement in the area of cloud computing because it
dramatically changes the horizon of IT. It provides many
benefits but the research communities are attracted through
automatic resource positioning, information security and
energy management. This paper presented cloud computing
overview and also focused on the state-of-the-art research.
Wikipedia, social networking sites, YouTube, Web-based
email clients: Yahoo and Gmail, Skype or Bit Torrents are all
applications that run in the cloud.
I.

F. Cloud Testing- Issues, Challenges, Needs and


Practice (Jerry Gao et al,2011)
Cloud computing offers an opportunity for testing as a service
(TaaS) for SaaS and clouds. But test engineers and quality
assurance managers experience many issues and challenges
regarding modern clouds testing and cloud based applications.
Basic concepts about cloud testing, which include its scope,
objectives, feature, and benefits are introduced in this paper.
This paper offers a clear comparative view between cloud
based application testing and web based software testing
which crossing different browsers including; IE, Firefox,
Opera, and Chrome. Cloud Testing allows engineers to create
and maintain test scripts manually or they can also use the
record and replay approach. Furthermore, different
commercial products and solutions are summarized and
compared in this paper which is supporting cloud testing as
services.
G. Cloud Computing: Research Challenges and StateOf-The-Art (Qi Zhang, 2010)
Landscape of information technology (IT) is rapidly changed
due the advancement of cloud computing. In this paper, a
survey is presented for cloud computing, which highlights its
key concepts, such as state-of-the-art implementation. This
paper provides a better design description of cloud computing
challenges. Therefore, cloud computing offers significant
benefits, but the current technologies is not fully developed to
achieve its full potential. In this domain many key challenges
emerge to receive attention from the management of power

2014, IJCCSE All Rights Reserved

and security. There are still tremendous opportunities for


researchers so they can make better contributions in this field,
and in the industry they can bring a remarkable impact to their
development.

Security Threats in Cloud Computing Environments


(Kangchan Lee, 2012)

The security architecture and its functionalities are highly


dependent on the reference architecture, and the main security
issues concerning this architecture are discussed in this paper.
Sometimes due to the black-box feature of the cloud service, it
is difficult for a cloud service user to recognize his providers
trust level. We cannot get and share the providers security
level in formalized manner. The cloud service users have no
potential to assess security implementation level attain by the
provider. The deficiency of sharing security level in view of
cloud service provider will become a consequential security
threat in use of cloud services for cloud service users.
J.

Secure Virtualization for Cloud Computing (Flavio


and Roberto, 2010)

The cloud provider and the cloud user are affected by


unresolved security issues of cloud computing. This paper
presents the several contributions for securing clouds via
virtualization. A novel architecture named Advanced Cloud
Protection System (ACPS) is proposed which increases cloud
resource security. ACPS effectively control the integrity of
infrastructure components and become transparent to cloud
users and virtual machines and also protect them from most
kinds of attack. The current open source solution entirely
implemented on proposed architecture and both its
performance and protection results have been collected and
analysed. Results show that the proposed solution is much
effective and introduces just a small performance handicap.

Vol. 02 No.01 February 2015

174 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)

K. A Survey On Software As A Service (SAAS) Using


Quality Model In Cloud Computing (sarbojit
Banerjee et al, 2014)
Sarbojit banerjee et al [11] describes cloud computing as a
kind of distributed computing divided in to three categories i.e.
Iaas, Paas, Saas. Software As A Service (SAAS) is a kind of
service which is an effective reuse paradigm. It provides many
benefits to service consumers; there is no initial cost to
purchase software. It provides free automatic updates, can be
accessed through Internet, and provides high availability. A
quality model is necessary for evaluating the quality of SAAS.
Different features of SAAS are identified in this paper. A
quality model (SAAS) provides compatibility, worldwide
accessibility, easy administration and, less difficult
collaboration. The traditional model for quality does not
support the key features of SAAS like security and quality of
service. So, in this paper, a new quality model is proposed for
the purpose of security and quality of service however it lacks
describing software tools to evaluate SaaS service.
L.

Cloud Computing Applications and their Testing


Methodology (G. Gowri et al, 2014)

G. Gowri [12] emphasizes on testing for developing high


quality cloud applications. Cloud computing open different
opportunities for different testing departments. Cloud testing is
primarily a software testing where testing can be carried out
through using resources across cloud applications. That is the
place where cloud testing has appeared as a new approach for
testing, where environment of cloud computing are grasped to
reproduce a real world with applications performance,
security, speed and, functionality. Cloud testing can be carried
out through testing tools and also through cloud services.
Cloud computing also work to direct the challenges and open
issues of different researcher .This paper uses the testing
concepts for enhancing the cloud testing field. Cloud Testing
control the cloud applications, drop the computing price, while
testing effectiveness increases however it does not describe
automated testing, this is a weak point.
M. Cloud Computing: Overview & Current Research
Challenges (Mohsin Nazir, 2012)
Mohsin Nazir [13] focuses on what cloud computing is and its
research challenges. In modern era different companies who
are seeking a competitive edge get real benefits through cloud
computing. It sets up the high cost computing infrastructure
for IT based solutions by eliminating the requirements. It
provides a flexible architecture of IT, can be accessible on
portable devices through internet .For instance, mobile cloud
computing is considered as one of the huge market for cloud
developers and for providers of cloud service .Cloud
computing also considered as a front runner in promoting a
virtual ,secure and economically feasible IT solutions. Cloud

2014, IJCCSE All Rights Reserved

computing technology is still on development stage.


Furthermore, research challenges are also highlighted because
these are currently faced by the Cloud computing.
N. Management and Security for Grid, Cloud and
Cognitive Networks (Carlos B. Westphall et al, 2011)
Carlos et al [14] discusses about innovations related to cloud
computing technology. Innovations are in the field of security,
environment maintenance, quality assurance and composition
of service. It helps to overcome challenges in service
management and development. It includes security validation
of Xml (Extensible Mark-up Language) file. Validation is
done at server side not client side, this shows validation is
done before processing. Describes an architecture required for
web services or applications. In future, detailed research is
required for attack avoidance in web application. This paper
lacks detailed research challenges which need to be identified
while adopting cloud computing.
O. Cloud Computing Research for IT Strategic Planning
(2012)
In private clouds, IT managers can exercise greater control
over network storage and security issues. IT professionals
agree that preparing for the cloud requires an investment to
simplify infrastructure in the data centre. Reorganizing IT to
deliver greater business agility and support of key business
initiatives will be a high priority. Recruiting, training and
retaining cloud architects, developers, engineers, and support
and service professionals are a big challenge for the largest
enterprises. Network performance is high on the list of
concerns driving the evolution of the next generation data
center. However, IT managers are addressing their top
concerns: cost and handling large data traffic. They can also
improve network speed and capacity to transport, manage and
store data.
P. Testing Techniques and Its Challenges in A Cloud
Computing Environment (Dr. Rahul Malhotra, 2013)
Cloud computing technique is evolved due to increasing
demand of reducing computing cost. For the successful use of
its services and resources, it must be tested using techniques
proposed by Dr. Rahul Malhotra , at each step. These
techniques include stress, functional, load, compatibility,
browser performance, latency, failover, capacity, soak and
SOASTA test. In cloud computing testing web applications are
executed on defined operating environment and infrastructure.
Major techniques in this filed involves non-functional testing,
functional testing and ability cloud testing. Number of
different challenges and issues in this field are also discussed.
Cloud testing can be carried out through testing tools and also
through cloud services. It also works to direct the challenges
and open issues of different researchers it does not describe the
high development cost required for cloud computing setup.

Vol. 02 No.01 February 2015

175 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
T.
Q. Cloud Computing Security Case
Research (Chimere et all, 2013)

Studies

and

Security in cloud computing involves different areas and


issues discussed by Chimere Barron et all. Many security
mechanisms are to protect cloud computing systems.
Researchers continue to develop new tools of improving the
security of cloud computing. In this paper several real world
cases where companies clouds were in filtered by attacks and
presented.
The solutions that the companies developed to prevent similar
attacks are discussed.
To protect cloud computing
technologies of detection, prevention and responding various
attacks must be developed. Our current research focuses on
detecting and preventing flood in cloud. We are developing
one detecting algorithm and one preventing algorithm. We will
implement and test these algorithms on this field.
R. The Power Of Client Plus Computing To Democratize
Research (Mike Houlihan, 2010)
Mike Houlihan[18] discusses the power of cloud plus
computing to democratize research. Cloud Computing is
coupled with powerful software on clients e.g. personal PC.
Because of large development in web and mobile applications
that fulfill cloud serviced demands, capabilities of entire
research community are broadened and accelerate scientific
innovations.
Microsoft CCREI program selects different institutions and
provide services to them directly on their personal PC through
some familiar software tools. It will work with different
researchers to provide them free client and cloud computing
access, cloud accessing tools and Microsoft technical support.
S.

A quantitative analysis of current security concerns


and solutions for cloud computing (Nelson Gonzalez
et al, 2012)

Nelson Gonzalez et al [19] emphasis on security as a necessary


part for cloud computing consolidation. To concentrate on the
cloud security information, common problems are identified
and group to form a seven category model, categories include
network and data security, interface, virtualization,
governance, legal issues and compliance. Cloud computing
risks taxonomy provides basic help in deeper consideration of
security issues. The issues of security concerns are legal
issues, compliance and less data control. Little solutions are
available for security concerns; this indicates the need of
evaluating potential areas still to be developed for providing
better security conditions when migrating processes and data
in cloud computing.

2014, IJCCSE All Rights Reserved

Cloud Computings Effect On Enterprises ( Mr. Odd


Steen et al, 2011)

Odd Steen et al presents the effect of cloud computing on


enterprises. Due to increasing demand of reducing computing
cost cloud computing technique evolved and become popular
in market. It introduces new computing methods which have
large utilization with less cost of administration and
infrastructure. It provides many benefits to service consumers;
there is no initial cost to purchase software. Different features
of SAAS are identified in this field. Cloud computing is a very
new technology in enterprises so, it becomes difficult for them
to take decision whether to adopt it or not. Main goal of this
paper to is to identify benefits and challenges regarding this
field thus helping customers to decide its adaptation.
III.

ANALYSIS

We have surveyed twenty techniques and used twenty


parameters for the evaluation of cloud computing. Analysis of
Table 2 and table 3 reveals that Security parameter is
discussed in every paper except K.Birman [16]. Cloud
security is
an
evolving
sub-domain
of computer
security, network security, and, more broadly, information
security. It refers to a broad set of policies, technologies, and
controls deployed to protect data, applications, and the
associated infrastructure of cloud computing. S.Benerjee[1],
G. Gowri[2] and M.R. Patra[3] provides the concept of
software quality matrices. In cloud computing software quality
matrices are developed to measure the quality of cloud
computing. It is a part of quality model to ensure cloud quality
as traditional quality models are not enough for measuiring
cloud quality in respect of security. Cloud testing is described
in every paper except K.Birman [16] M.Ahmed [14] and
C.Barron [9]. Different software requires cloud computing
environment for testing, different types of cloud computing
involves functional, non-functional and ability testing. G.
Gowri[2], Carlos B. Westphall [4] compares cloud computing
and virtualization. They call cloud computing as an umbrella
and virtualization concept come under this umbrella. Except
Carlos B. Westphall[1], G. Gowri[2] all papers describe the
concept of service level agreement (SLA). SLA is a contract
between consumer and producer, it acts as a broker. It a one of
several research challenges of cloud computing. Mohsin
Nazir[4] identify different cloud computing entities including
providers, consumers and brokers. Carlos B. Westphall [5]
describes in detail the cross executing scripts parameter. XSS
consists of executing scripts on Web pages through the
exploration of not correctly validated fields or URL. Almost
every paper follow the technique of scalability which will
describe how cloud computing will handle increased loads of
traffic volume. Only C.Barron[9] provides the Case study and
examples for security purposes. Underlying principles or
techniques can be explored by case studies. Research
challenges are identified in all techniques except
S.Benerjee[1], G.Gowri[2], C.B.Westphall[3]. The various

Vol. 02 No.01 February 2015

176 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
research challenges discussed in different techniques are;
Service Level Agreements (SLAs) ,Common Cloud Standards
, Cloud Data Management and Security ,Migration of virtual
Machines , Data Encryption ,Energy Management ,Access
Controls ,Multi-tenancy ,Reliability & Availability of Service,
and Platform Management. M.Nazir [4] has provided the
deployment model, platform, storage, software and
infrastructure as services that scale up or down depending on
the user demand. There are four deployment models which are
as follows Public Cloud, Hybrid Cloud, Private Cloud, and
Community Cloud. All techniques have provided the
Reliability concept because it is the demand of the user to get a
cloud as a reliable resource. A. Gani [20] technique provides a
safe zone to store users data so it will reduce the issues of
users such as software updating, virus attacks and data loss. If
server failure happens then cloud computing systems will
transfer and backup those data to other machines to make sure
that the whole system is working properly. S.Benerjee[1],
C.B.Westphall[5], A.Gani [20] technique provides Quality of
communication. For Quality of communication we have to
upgrade the bandwidth, by upgrading the bandwidth the
performance will be improved but it will incurs additional cost
to customer. S.Benerjee[1], G. Gowri[2], M.R. Patra[3]
provides the Privacy concept , it will increase the user
expectation because the cloud provider will prevent
unauthorized access to both data and code. All techniques
follow the Mobility mechanism except F.Lombardi et al[13]
and K.Birman et al[16],mobile nodes can establish connection
with others in mobile computing network. S.Benerjee[1],
G.Gowri[2], C.B.Westphall[3] provides the concept of
Interoperability. This is the ability of two or more systems
work together in order to exchange information and use that
exchanged information. All techniques have provided the
protection effectiveness results specially the proposed novel
advanced architecture (ACPS) for cloud protection. Results
have shown that the proposed approach is much effective but
introduces just a small performance handicap.
Therefore, we suggest that cloud computing technology should
be promoted because of its high reusability and scalability
properties. Cloud testing should be adopted because it provide
easy to use testing environment. A highly generic design must
be customizable to specific domain through reusability. It is
also suggested that a different quality model should be used to
ensure the quality of system. Keeping in view the limitations
and suggestions about adopting cloud computing technique
especially timing constraints must never be ignored.
IV.

CONCLUSION

As the initial cloud computing cost is very high, but once it is


developed it will provide a lot of benefits to its users. Many
security mechanisms are required to protect cloud computing
systems because it is entirely dependent on internet technology
where data of client is maintained in the data centre of a cloud
provider like Microsoft, Amazon, and Google etc. But the
limited control to the data may cause various security threats

2014, IJCCSE All Rights Reserved

sand issues; insecure interfaces and inside attacks. Cloud


computings resources should be accessible to all clients
anytime, and from any platform (mobile phone, desktop PC).
In future, more work on clouds security is needed because
sometimes because of black-box feature of the cloud service,
it is difficult for its users to recognize his providers trust level.
The deficiency of sharing security level will become a
consequential security threat for cloud service users.
Therefore, we should develop new security techniques and
older security techniques should be thoroughly improved so
we can work with the clouds architecture more efficiently.
REFERENCES
[1] Ken Birman, Gregory Chockler, Robbert van Renesse:
Towards a Cloud Computing Research Agenda, 2008,
http://www.cs.cornell.edu/projects/ladis2008/
[2] Qi Zhang Lu Cheng Raouf Boutaba: Cloud computing:
state-of-the-art and research challenges,2010
[3] Jerry Gao, Xiaoying Bai, and Wei-Tek Tsai, Cloud
Testing- Issues, Challenges, Needs and Practice, September,
2011
[4] Nariman Mirzaei , Cloud Computing, 2008
[5] Pankaj Arora,Rubal Chaudhry Wadhawan, Er. Satinder Pal
Ahuja, Cloud Computing Security Issues in Infrastructure as a
Service, January ,2012, http:// www.ijarcsse.com
[6] Rabi Prasad Padhy , Manas Ranjan Patra, Suresh Chandra
Satapathy, Cloud Computing: Security Issues and Research
Challenges, December 2011
[7] Han Qi, Abdullah Gani, Research on Mobile Cloud
Computing: Review,Trend and Perspectives, 2012
[8] Kangchan Lee Security Threats in Cloud Computing
Environments, October, 2012
[9] Mohiuddin Ahmed, Abu Sina Md. Raju Chowdhury,
Mustaq Ahmed, Md. Mahmudul Hasan Rafee, An Advanced
Survey on Cloud Computing and State-of-the-art Research
Issues, January ,2012, http://www.IJCSI.org
[10] Flavio Lombardi , RobertoDiPietro, Secure virtualization
for
cloud
computing,
June
,2010
http://www.elsevier.com/locate/jnca
[11] Nelson Gonzalez, Charles Miers, Fernando Redgolo,
Marcos Simplcio, Tereza Carvalho, Mats Naslund and
Makan Pourzandi, A quantitative analysis of current security
concerns and solutions for cloud computing, 2012,
http://www.producao.usp.br

Vol. 02 No.01 February 2015

177 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
[12] Mike Houlihan, The Power of Client Plus Cloud
Computing to Democratize Research, December,2010,
http://research.microsoft.com
[13] Chimere Barron, Huiming Yu and Justin Zhan , Cloud
Computing Security Case Studies and Research, July,2013,
http://www.iaeng.org/
[14] Dr. Rahul Malhotra & Prince Jain, Testing Techniques
and its Challenges in a Cloud Computing Environment,
July,2013, http://www.thesij.com/
[15] Mr. Odd Steen and Rehan Saleem, cloud computings
effect on enterprises, January, 2011, http://lup.lub.lu.se/

http://www.ijircce.com/
[17] Sarbojit Banerjee, A survey on Software as a service
(SaaS) using quality model in cloud computing, January,
2014, http://www.researchgate.net/
[18] Mohsin Nazir ,Cloud Computing: Overview & Current
Research
Challenges,
November,2012,
http://www.iosrjournals.org
[19] Cloud Computing Research For IT Strategic Planning ,
January, 2012, http://www.intel.com/
[20] Carlos et al, Management and Security for Grid, Cloud
and Cognitive Networks, 2011, http://www.fsma.edu.br/

[16] G. Gowri and M. Amutha, Cloud Computing


Applications and their Testing Methodology, February, 2014,

2014, IJCCSE All Rights Reserved

Vol. 02 No.01 February 2015

178 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
TABLE I:

EVALUATION CRITERIA FOR FOR CLOUD COMPUTING APPLICATIONS


AND TESTING METHODOLOGIES

Evaluation parameters
Security

Meaning
Proposed technique is secure or not

Software quality matrices

Technique to ensure quality, involves security, services, and


quality matrices.

Testability

Proposed design is tested or not

Virtualization

To spawn whole network topologies as virtual machines


(VMs) and interconnect them in
Software.
Challenges to adopt cloud computing technology.

Simulation results.

Allow several instances of one Application to be replicated on


multiple servers if need arises.
Entities in business market and service level.

Specifications of SLA.

Yes, no, solutions, issues

Deployment constraints

Consists of executing scripts on Web pages through the


exploration of not correctly validated fields or URL.
Proposed technique is reusable or not
Proposed system is scalable or not, its ability to either handle
growing amounts of work or not
Support of examples
Researcher can use simple tools to get answer to difficult
questions.
Constraints in deploying cloud computing technique.

Testing challenges

Challenges in cloud computing testing environment.

Yes, No

Reliability

System will not crash until the promise time

Quality of communication

Bandwidth upgrading,
Data delivery time reducing
The state of being free from public attention
Employees can access information wherever they are, rather
than having to remain at their desks.

Yes, No, If failure happens then


backup data to other machines
Yes, No

Research challenges
SLA (service level agreement)
Cloud computing entities
Cross Site Scripting
Reusability
Scalability
Case studies
Research democratization

Privacy
Mobility
Interoperability
and Web
Browsers &
Technology
Effectiveness

The ability to communicate, exchange data, and use the


information that has been exchanged

the degree to which something is successful in producing a


desired result; success

2014, IJCCSE All Rights Reserved

Vol. 02 No.01 February 2015

Possible values
Security threats, Challenges,
issues, yes, No
Security
matrices,
QOA
matrices,
software
quality
matrices.
Yes, no, issues

Challenges, issues

Yes, No

Yes, No
Yes , No
Yes, No
Yes ,No
Yes, No

Yes No
Yes ,No
Yes, No, IE (version 6-8),
Firefox
Apple Safari, Google
Chrome, and Opera
Yes, No, ACPS under attack

179 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)

TABLE II

ANALYSIS OF PARAMETERS FOR CLOUD COMPUTING APPLICATIONS AND ITS TESTING METHODOLOGIES

Scalability

Yes,
quality
models
are
specified

No

No

No

No

No

No

Yes,reus
e various
internet
based
services

Yes

G. Gowri, 2014

Yes,
virtual
security
applicatio
ns

Yes,
security
applicati
ons,
QOS

Yes,
specified
testing
methods

Yes,
virtual
security
applicatio
ns.

No

No

No

No

Yes

Yes

M.R. Patra, 2011

Yes,
security
architectur
e
specified.

Yes

No

Yes

Yes,
research
challeng
es
specified
e.g.SLA

Yes,
descri
bed

No

No

Yes

Yes

Mohsin
Nazir,2012

Yes,
security
services
are
identified

No

Yes,
testing
types,
methods

No

Yes,
research
challeng
es
are
describe
d

Yes,
descri
bed

Yes,
buisness
level and
services
level
entities

No

Yes

Yes

Carlos
B.
Westphall,2011

Yes,
security
for grid,
networks

Yes,
envirnm
ent
security,
QA
describe
d

No

Yes,
virtualizat
ion
in
security

Yes,
challeng
es
identifie
d SLA

Yes,
detail
ed
descri
ption

No

Yes,
executi
ng web
pages
scripts
are
defined

Yes

Yes

O.Steen, 2008

Yes, data
security

Yes

No

Yes

Yes

No

No

No

No

No

S. A.
2012

Yes

Yes

Yes

Yes,
virtualizat
ion
to
consolidat
e server

Yes

No

No

No

Yes

Yes

computing

Reusability

XSS

Cloud
Entities

SLA

Research Challenges

Yes,
network
security,
applicatio
n security
are
described

2014, IJCCSE All Rights Reserved

Virtualization

SQM

S.Benerjee,2014

Chaves,

Testability

Security

Techniques

S#
1

Vol. 02 No.01 February 2015

180 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)

9
1
0
1
1

1
2

D.R.Malhot
ra
and
P.Jain,2013
C.Barron,2
009
M.Houliha
n, 2010
P.Arora,
2012

Yes

No

Yes

Yes

Yes

No

No

No

Yes

Ye
s

Yes

Yes

No

Yes

Yes

No

Yes

No

Yes

Yes

No

No

No

Yes

No

No

No

Yes

Ye
s
No

Yes,
data
security is
described

No

Yes

Yes

Yes

Yes

No

No

Yes

No

N.

Yes

No

No

No

Yes research
challenges
specified

No

No

No

Yes

Ye
s

Cloud
security
model
Yes
,Informatio
n security
is identified
Yes

No

Yes

Yes

Yes

Yes

No

No

Yes

Ye
s

No

No

Yes

Yes

No

No

No

Yes

Ye
s

No

Yes

Yes

Yes

Yes

No

No

Yes

No
Ye
s
Ye
s

Mirzaei,20
08
1
3
1
4

F.
Lombardi
,2009
M.Ahmed,
2012

1
5
1
6
1
7

K.Lee,2012
K.Birman,2
008
Q.Zhang,20
10

No

No

No

No

No

No

No

No

Yes

Yes

No

Yes

Yes

Yes

Yes

No

No

Yes

1
8

R.Prasad,
2012

Yes

No

Yes

Yes

Yes

No

No

Yes

Ye
s

1
9
2
0

M.A.Vouk,
2008
A.Gani,201
2

Yes

Yes

Yes

Yes

Yes

Yes

Yes,Cloud
providers
and
consumers
are
two
main
entities
No

No

Yes

Yes

Yes

Yes

No

Yes

Yes

No

No

Yes

Ye
s
Ye
s

2014, IJCCSE All Rights Reserved

Vol. 02 No.01 February 2015

181 | P a g e
www.ijccse.com

ISSN: 2312-7694
Summaya et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
TABLE III ANALYSIS OF PARAMETERS FOR CLOUD COMPUTING APPLICATIONS
AND ITS TESTING METHODOLOGIES

Yes

Yes

No

Yes

Yes

Yes

No

Yes

Yes

Yes

Ye
s

No

No

Yes

No

Ye
s

Yes

Yes,
deploym
ent
models
No

Ye
s

Yes

No

Yes

No

Ye
s

No

No

No

Ye
s

Yes

No

Yes

No

Ye
s

S. A.
Chaves,
2012
D.R.Malhotr
a and P.
Jain,2013
C.Barron,20
09

No

Yes

No

Ye
s

No

No

Yes

Yes

Ye
s

No

No

No

Ye
s

No

No

Yes

No

Ye
s

Yes, security
case studies

Yes

No

Ye
s

Yes

No

Yes

No

Ye
s

10

M.Houlihan,
2010

No

Yes

No

Ye
s

Yes

No

Yes

No

Ye
s

11

P,Arora,201
2

No

No

No

Ye
s

Yes

Yes

Yes

Yes

Ye
s

12

N.Mirzaei

No

No

No

No

Yes

Yes

Yes

13

F. Lombardi
,2009
M.Ahmed,2
012
K.Lee,2012

No

No

No

Yes

Yes

No

No

No

No

No

No

Yes

Yes

Yes

Yes, security
case studies
No

No

No

No

Yes

Yes

No

Yes

No

No

No

No

No

Ye
s
Ye
s
Ye
s
Ye
s
No

No

Yes

N0

No

Yes

Yes

Yes

No

No

No

Yes

No

Yes

No

No

No

No

No

Yes

Yes

Yes

No

No

No

Ye
s
Ye
s
Ye
s
Ye
s
Ye
s
Ye
s
Ye
s
Ye
s
Ye
s

Yes

Yes

Yes

Yes

No

No

No

No

No

No

No

Mohsin
Nazir,2012

No

Yes,
virtual
tools
identified.
No

Carlos B.
Westphall,2
011
Odd Steen,
2008

No

2
3

6
7

14
15
16
17
18
19
20

K,Birman,2
008
Q.Zhang,20
10
R.Prasad,20
12
M.A.Vouk,2
008
A.Gani,2012

2014, IJCCSE All Rights Reserved

Vol. 02 No.01 February 2015

Effectiveness

Mobility

Yes

No

Interoperabil
ity
and Web
Browsers &
Technology

Privacy

Yes

S.Benerjee,2
014
G. Gowri,
2014
M.R. Patra,
2011

Quality of
communicati
on
Reliability

Deployment
Constraints

Research
Democratizat
ion

Case studies

Techniques

S#

Ye
s
Ye
s
Ye
s

Ye
s
Ye
s
Ye
s

Ye
s
No
Ye
s
Ye
s

182 | P a g e
www.ijccse.com

Das könnte Ihnen auch gefallen