A Survey on Cloud Computing Security, Challenges and Threats
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has associated risks and threats also which include – security, data leakage, insecure interface and sharing of resources and inside attacks.
Authors and Affiliations
Rajnish Choubey , Rajshree Dubey , Joy Bhattacharjee
A NOVEL CODEBOOK INITIALISATION TECHNIQUE FOR GENERALIZED LLOYD ALGORITHM USING CLUSTER DENSITY
In this paper, a novel codebook initialization technique has been adopted for Generalized Lloyd Algorithm (GLA). GLA plays an important role in the design of Vector Quantizers. The proposed technique generates initial se...
A New Look to Traversal Algorithms Using Set Construct Data Structure
Tree traversal refers to the process of visiting or examining or updating each node in a tree data structure, exactly once, in a systematic way. Such traversals are classified by the order in which the nodes of the tree...
Artificial Bee Colony Algorithm to improve brain MR Image Segmentation
Image segmentation is a primary step in image analysis used to separate the input image into meaningful regions. MRI is an advanced medical imaging technique widely used in detecting brain tumors. Segmentation of Brain M...
Extraction of Radiology Reports using Text mining
In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical findin...
ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
Multi signature is a signature scheme in which signers jointly generate a signature on a message. Threshold multisignature combines the traits of threshold signature and multisignature. In threshold multisignature, a gro...