Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

A Survey on the Use of 3D Password in Security

Passwords play an important role in various computing applications like ATM machines, internet services, windows login, and authentication in mobiles etc. There are many authentication techniques are available, Such as...

Automated Plant Irrigation System Based on Soil Moisture and Monitoring Over IOT

An automated irrigation system mainly considered to optimize the usage of water on agriculture because of climatic situation which leads to lack of rains. The farmers running on the agriculture fields are needy of rain,...

Noise Estimation of Non-Stationary Voiced Speech Using Chirp Model

Speech Enhancement algorithmic models removes or reduces the noise and improve one or more perceptual aspects of noisy speech most notably quality and intelligibility. The speech signal is considered as Non-stationary c...

Comparative Study of Various Routing Protocols for Wireless Sensor Networks

Wireless Sensor Networks (WSN) are intended for monitoring an environment by sensing it, then collecting data, processing it and finally transmitting it to final destination. These sensor nodes have some constraints due...

A Booster and PWM Based Power Amplifier for Reaction Wheel

Reaction wheel is an inertial actuator in a spacecraft attitude control system and is used to generate suitable attitude control torques for correcting spacecraft attitude deviation or adjusting to an assigned attitude....

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 880
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://europub.co.uk/articles/-A-18598