Confidentiality for cloud computing

Abstract

Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on -demand provisioning with little or no sincere IT infrastructure investment costs. This paper discusses to which degree this is justified, by presenting the Cloud Computing Confidentiality Model (CCCM). The CCCM is a step-by-step model that creates mapping from data sensitivity onto the most suitable cloud computing architecture. To achieve this, the CCCM determines first of all the security mechanisms required for each data sensitivity level, secondly which of these security controls may not be supported in certain computing environments, and finally which solutions can be used to manage with the identified security limitations of cloud computing. The most systematic security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures, while they can be realized in private cloud computing architectures. In this thesis I Suggests hybrid cloud model.

Authors and Affiliations

Vibha Sahu, Praveen Shrivastav, Dipti Chhatri, Dr. S. M. Ghosh

Keywords

Related Articles

Facial Expression Recognition: A Study

Facial Expressions are the outcome of the moments done through face muscles with respect in the changes on face. These expressions may represent the person’s internal emotional stage as well as thought in a body languag...

High Speed Low Power Self Timed CAM Application Based On Reordered Overlapped Search Method

This paper introduces a reordered overlapped search mechanism for high-throughput low-energy contentaddressable memories (CAMs). Most mismatches can be found by searching a few bits of a search word. To lower power diss...

Smart Zone Smart System

In India there are many cars but here we have designed automatic car. In this we have implemented applications like: speed control, automatic wi per adjustment, line follow. Line follower vehicle were one of the earlies...

Excess Thermodynamic Properties and Molecular Interaction in Ternary Systems of Aniline at 303.15K

Densities and viscosities of ternary liquid mixtures of Aniline with two polar solvents viz. Methyl ethyl ketone and N, N-Dimethylformamide and three non-polar solvents viz. benzene, toluene and carbon tetra chloride as...

Production of Tantalum Carbide Tool Bit Using Powder Metallurgy Process

The paper provides an advanced method of manufacturing tantalum carbide tool bit using powder metallurgy process. The said method is used to manufacture the tool bit. This tool bit is then tested for the machining of va...

Download PDF file
  • EP ID EP19159
  • DOI -
  • Views 263
  • Downloads 5

How To Cite

Vibha Sahu, Praveen Shrivastav, Dipti Chhatri, Dr. S. M. Ghosh (2014). Confidentiality for cloud computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19159