Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

slugTime Based Messenger- An Android Application

The developed application is time based i.e the user can select the desired time limit (say x is starting limit and y is ending limit) and when the application is opened it automatically goes to the silent mode and when...

Design Aids as per IS 800:2007 using Computer Aided Design for Tension Member

The B.I.S. recently revised the new IS 800:2007 . this is based on limit state method. This new code includes variety in elements like tension members, compression members, flexural members , combined axial and bending...

Hyper-Threading Technology in Microprocessor

Hyper-Threading Technology is a form of simultaneous multithreading technology. Architecturally, a processor with Hyper-Threading Technology consists of two logical processors per core, each of which has its own process...

Utilization of Copper Slag in Bituminous Concrete with a Stone Dust and Flyash as a Filler Material

In this paper an attempt has been made to utilize the copper slag, stone dust and fly ash in bituminous concrete. The copper slag is produced as waste from roasting of copper, in which sulphur is eliminated. Copper slag...

Stresses around dental implant and its failures: A Review

Dental implant is more important for failures of real teeth. Dental implant is an option for the damaged teeth. This paper shows the important value of dental implant and the when masticatory forces acts on the surface...

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 881
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://europub.co.uk/articles/-A-18598