Identification And Analysis Of Risks For Cloud Computing In IAAS, PAAS And SAAS
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
Now a days, cloud computing has been an emerging concept in the IT industry. Cloud computing is not a new technology but is a new way of using or delivering the resources. It also enhances the efficiency of computation by providing the facility of centralized database, memory processing and on demand network access. This paper examines the different categories of risks which can be controlled or quantified. It also focuses on the analysis of risk and somewhat how to assess the risk in the cloud computing
Authors and Affiliations
Prof. Chitra Baggar , Prof. Richa Sinha
A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks
Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...
Secure Keyword Based Search in Cloud Computing: A Review
An effective search that give the better suggestion to the user so that the user can get better choices for the services is also a challenge for cloud computing. Several methods have been given to solve the problem of ef...
Impact Analysis of Modulation Formats in 40 Gbit/s DWDM Systems
The development of digital optical communications systems at high flow rates (NX40Gbit/s) and wavelength division multiplexed (WDM) reveals new issues such as the need to compensate the chromatic dispersion at higher lev...
ALL-EMBRACING REVIEW OF WIRELESS NETWORK PROTOCOL,OPTIMUM NETWORK SIMULATOR
Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and even fridges to computer networks, without physical wire connections. Wireless connectivi...
Performance Comparison of Eigen-faces vs. Fisher-faces for Face Recognition
Face recognition issue gained more interest recently due to its various applications and the demand of high security. In this paper two Face Recognition techniques, Eigen-faces commonly called Principal Component Analysi...