Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

Fault Recovery Using Scan Chain Based Approach Technique

Recent applications of all embedded system will get failure due to multiple faults occurring in the system. This fault should be detected and corrected simultaneously while running the system. In practise we use a scan...

Optimal Multi- Level Thresholding for Color Image Using Kapur’s Entropy and Bacterial Foraging Algorithm

This paper presents, a multi-thresholding approach for a class of 481 x 321 sized standard colour test images using Kapur’s entropy function and Bacterial Foraging Optimization (BFO) optimization algorithm. In this work...

Development of a Mathematical Model for Kinematic Analysis of a Crusher Mechanism Using Matlab as a Tool

Objective of this thesis is to develop a mathematical model for a crusher mechanism, which can calculate Kinematic Parameters like Velocity and Acceleration of any point on Jaw Link of a crusher which in turn is require...

Strength Analysis of Steel Fiber Reinforced Concrete with Different Types of Curing

Concrete is a composite material containing hydraulic cement, water, coarse aggregate and fine aggregate. The resulting material is a stone like structure which is formed by the chemical reaction of the cement and water...

Water Consumption Awareness of People in City of Isparta in Turkey

This study was conducted in the Isparta region; it aims to determine water use of people on the basis of families and individuals, quantities of water consumption, their attitudes and behaviours towards water saving met...

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 878
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://europub.co.uk/articles/-A-18598