Cloud Computing Threats
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 8
Abstract
The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.
Authors and Affiliations
Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh
Analysis on Synthesis, Storage & Combustion characteristics of DME as fuel in CI engines
This article reviews on various methods of production of Di-Methyl Ether (DME) avail in present scenario, its storage difficulties and the reasons for holding DME still under research as an alternative fuel. The demand...
PID Controller Tuning and Its Case Study
This paper has been like to presents the Comparative study of Proportional (P), Proportional Integral (PI), and Proportional Integral Derivative (PID) controllers. The PID controller is one of the most commonly used dyn...
Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing
In cloud computing, sharing of data is considered as a challenging security problem. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a...
A Highly Auto Configuration for A Node Using Addressing Protocol in Ad Hoc Networks
The addressing configuration may be a key challenge in networks owing to the shortage of infrastructure. Autonomous addressing protocols need a distributed and self-managed mechanism to avoid address collisions in an ex...
slugA survey on Nanotechnology and Its Medical Applications
Nanotechnology is an advanced scientific technique that provides more accurate and timely medical information for diagnosing disease. Nanotechnology is a focal point in diabetes research, where nanoparticles in particul...