A Literature Review on Implementing Security in Cloud Environment

Abstract

In modern computing, Cloud computing is an important part of any small or large organization. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. network, storage, software application), whenever required, without being concerned with the complex underlying technology and infrastructure architecture. The most important feature is that the computing resources are available whenever they are needed. Additionally, users pay only for the resource they actually use. As a result, cloud users can easily scale their information technology infrastructure, based on their business policy and requirements. However, there is often a lack of security when realizing such cloud-based solutions. In the longer term, the problems caused by this lack of security might inhibit companies from taking advantage of cloud-based solutions. This paper provides literature review on various methods for implementing security in cloud environment.

Authors and Affiliations

Manisha . , Sunita Rani

Keywords

Related Articles

Impact Characterization of Fiber/Foam Reinforced Polymer Nanocomposites

Synthetic foam is light weight engineered foam which is incorporated in polymer matrix. The synthetic foam structure gives several advantages such as low density, high strength and low co-efficient of moisture absorptio...

Lossless Image Compression Technique for Multiview Image Using Arithmetic Encoding

Image compression is a process that reduces the image size and removing the unreasonable information. Shorter data size is suitable because it simply reduces cost. There are number of different data compression methodol...

Enhancement of Transient Stability Using UPFC for 11 Bus Systems

FACTS devices are available, which can help Power Engineers to deal with problems like Large Signal Stability and economic Factors that gives strong incentives to raise the Stability limit of the System, depending upon...

Performance evolution of turbo coded MIMO-WiMAX system over different channels and different modulation

The wireless communication is highly affected with the channel behavior. The uses of Multiple-Input MultipleOutput system and FEC code are most common in wireless standard for provide the fast and reliable communication....

Automatic Door Locking System Using Bluetooth Module

Smart home automation system playes a major role which helps in reducing a work by using some technologies. The proposed work is to send a signal to door from a tablet or mobile devices by using bluetooth system. This a...

Download PDF file
  • EP ID EP24758
  • DOI -
  • Views 409
  • Downloads 14

How To Cite

Manisha . , Sunita Rani (2017). A Literature Review on Implementing Security in Cloud Environment. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24758