A Survey on Cloud Computing Security, Challenges and Threats

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3

Abstract

Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has associated risks and threats also which include – security, data leakage, insecure interface and sharing of resources and inside attacks.

Authors and Affiliations

Rajnish Choubey , Rajshree Dubey , Joy Bhattacharjee

Keywords

Related Articles

A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY

In this paper, a novel codebook initialization technique has been adopted for Generalized Lloyd Algorithm (GLA). GLA plays an important role in the design of Vector Quantizers. The proposed technique generates initial se...

A New Look to Traversal Algorithms Using Set Construct Data Structure

Tree traversal refers to the process of visiting or examining or updating each node in a tree data structure, exactly once, in a systematic way. Such traversals are classified by the order in which the nodes of the tree...

Artificial Bee Colony Algorithm to improve brain MR Image Segmentation

Image segmentation is a primary step in image analysis used to separate the input image into meaningful regions. MRI is an advanced medical imaging technique widely used in detecting brain tumors. Segmentation of Brain M...

Extraction of Radiology Reports using Text mining

In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical findin...

ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings

Multi signature is a signature scheme in which signers jointly generate a signature on a message. Threshold multisignature combines the traits of threshold signature and multisignature. In threshold multisignature, a gro...

Download PDF file
  • EP ID EP160515
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

Rajnish Choubey, Rajshree Dubey, Joy Bhattacharjee (2011). A Survey on Cloud Computing Security, Challenges and Threats. International Journal on Computer Science and Engineering, 3(3), 1227-1231. https://europub.co.uk/articles/-A-160515