Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

slugWi-Fi Direct in Android Using Peer to Peer Communication

Open Handset Alliance (OHA) a confederation of 50 Telecoms, mobile hardware, and software companies, headed by Google, were found on 5th of November, 2007 and unveiled a new platform that is called Android. At present...

MATLAB Techniques for Enhancement of Liver DICOM Images

DICOM has become a standard for medical imaging. Its purpose is to standardize digital medical imaging and data for easy access and sharing. There are many commercial viewers that support DICOM image format and can read...

Context Aware Unlinking for Improving Quality of Service

The improvement in the Quality of Service for uplink in wireless communication system can be done in a better way by aware of the context it deals with. The prior measurement and statistics of the various context parame...

Performance Analysis of Searching Algorithms in C#

Searching Technique is mostly used in computer sciences and it used as a scale of a system performance and efficiency through implementing different searching algorithm’s. In this research paper we have focus on the per...

slugComparison between the best online suites

The battle to be the best online suite in the cloud has never been more hotly contested. It’s not as straightforward as it seems either. This paper gives the introduction to Office Software Suite, core feature, cloud i...

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 945
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://europub.co.uk/articles/-A-18598