Cloud Computing: Security Threats and Counter Measures

Abstract

Cloud computing is internet based computing whereby shared resources, software and information, is provided to computers and devices on-demand, like the electricity grid. It is a great idea to make many normal computers together to get a super computer where it can do a lot of things. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS, PaaS, and IaaS to distribute the powerful computing capacity to end user’s hands. This article introduces the background and service model of cloud computing and also introduces the existing security issues in cloud computing.

Authors and Affiliations

K. Valli Madhavi, R. Tamilkodi, K Jaya Sudha

Keywords

Related Articles

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Mobile Ad hoc Network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administ...

An Algorithmic Framework In Order To Deal With Efficient Resource Allocation In Overlay Routing

Overlay routing has been projected in latest years as an effectual way to attain convinced routing properties devoid of leaving into the extended and monotonous procedure of consistency and worldwide exploitation of...

A Specialized Learning Framework for Aggregate Performance

Aggregate Performance is study of behaviour of a person who’s registered in a social network. More number of individuals are connection each other in this networks. The media is facing a major problem for finding the...

An Efficient and Effective Ranking On Spatial Data By Quality Preferences

A spatial database is database that is optimized to gather and query the information that is linked to objects in space and a spatial preference query objects are based on the qualities of their spatial area. A huge...

A secure indexing method for privacy- preserving keyword search

E-healthcare systems are ever trendier, a large amount of private data for medical principle is occupied, and populace start to appreciate that they would entirely lose organize over their individual information once...

Download PDF file
  • EP ID EP27452
  • DOI -
  • Views 340
  • Downloads 6

How To Cite

K. Valli Madhavi, R. Tamilkodi, K Jaya Sudha (2012). Cloud Computing: Security Threats and Counter Measures. International Journal of Research in Computer and Communication Technology, 1(4), -. https://europub.co.uk/articles/-A-27452