Conceptualization of Cloud Computing and its Security Threats, Challenges, Technologies and Application
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Cloud computing is the utilization of computer resources i.e. hardware and software which are delivered as service over a network. It delivers infrastructure, platform and software (applications) as services, which are made available to consumers. It is platform that offer high performance computation capability and managed by individual organization. Cloud provides use of virtualization technologies combine with self-service. In this paper we introduce different types of cloud computing deployment models and architecture. This paper describes the challenges in cloud computing and its security threats. Different types of cloud computing deployment models, viz. private, public, hybrid and community clouds are discussed. In this paper we also discussed the different technologies and its applications used for cloud computing.
Authors and Affiliations
Gaurav Dhawan
Study on Efficient Way to Identify User Aware Rare Sequential Pattern Matching in Document Stream
As we know internet is the source of large number textual document those are created by users and distributed in various forms. Most of existing works are done on topic modelling and the evolution of individual topics,...
In-vitro Antioxidative Property of Water Soluble Bacterial Melanin and Evaluation on Novel Model System
Melanin is important because it’s the most primitive and universal pigment in living organisms. The present study reports antioxidant activity of melanin pigment from EP83 a Gram negative bacterial strain isolated from...
Transient thermal analysis of modified emergency container
Conventional emergency containers used in steel industry are of less capacity and they had to line with refractory lining which is not economical and time killing process and even the material used for the container is...
Free Vibration Analysis of Differernt Materials under Crack as a Cantilever Beam
A simple and unified approach is presented for the vibration analysis of a cantilever beam. Natural frequency and damping ratio are calculated with an experimental process. Estimating damping still remains as one of the...
Design and Implement Dynamic Key Generation to Enhance DES Algorithm
Cryptography is the process of transforming message to avoid an unauthorized access of data. Key is an important part in cryptography. For higher level of secure communication key plays an important role. For increasing...