A Review on Cloud Computing Security and Privacy in Service Oriented Architecture (SOA)
Journal Title: International Journal of Machine Learning and Networked Collaborative Engineering - Year 2017, Vol 1, Issue 2
Abstract
Cloud computing is powerful computing which is transformed the traditional computing and industries. Cloud is not a new concept. Many organizations like Google, Microsoft, and Amazon accelerate in developing this computing and provide the services for lots of users and storing the data through cloud now become a norm. But there are many issues that arrive to store the data in cloud. In this paper we review some securities issues and give a survey solution that have been done to minimize the security risk and describe future research work about all these risk that occur when data is stored in cloud computing.
Authors and Affiliations
Surbhi Sharma
Eight Legs Rimless Wheel Robot Model Driven on Level Ground Using one actuator
It is outstanding that a rimless wheel (RW) needs actuators to walk on the level ground. There is the primary test hard to discover an appropriate control framework to accomplish a stable RW movement. There is the model...
A Review on Cloud Computing Security and Privacy in Service Oriented Architecture (SOA)
Cloud computing is powerful computing which is transformed the traditional computing and industries. Cloud is not a new concept. Many organizations like Google, Microsoft, and Amazon accelerate in developing this computi...
Usage of the Big Data Idea in Associations Potential Outcomes, Obstructions and Difficulties
This research report the examination of the Big data’s considered. It has seven zones. In the standard, the developing bit of information and facts and it’s fast in-wrinkle in the new socio-quiet the truth, are talked ab...
Extracting Knowledge from Large Social Key Valued Data
With advances in computer and information technology, large amount of different types of valuable data are gathered and generate in the present time of huge information from a large range of sources of availability of in...
Steganalysis for Reversible Data Hiding Based on Neural Networks and Convolutional Neural Networks
Lossless data hiding techniques is a technique that is very interesting. In which there is a large amount of reversible information hidden technologies. This technique makes it possible to restore the original image afte...