Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Cloud computing is set of resources and services offered through the Internet. Cloud services aredelivered from data centers located throughout the world. Cloud computing facilitates its consumers byproviding virtual resources via internet. General example of cloud services is Google apps, provided by Googleand Microsoft SharePoint. The rapid growth in field of “cloud computing” also increases severe securityconcerns. This paper aims to identify security threats in cloud computing, which will enable both end users andvendors to know about the key security threats associated with cloud computing
Authors and Affiliations
Tayseer TagElsir Ahmed Osman, , Dr. Amin babiker A/Nabi Mustafa
Socio Media Connect: A Social Profile based P2P Network
Abstract: It is observed that users tend to like and follow a particular type music/movies based on their socialinterests. Users like music of particular artists, album; movies/TV shows of a particular actor, direc...
Implementation of Emotional Intelligence in a machine
Abstract: This paper is an extended work of our paper “A New Concept on Thinking Machines: CyberPersonality” published in IJCS journal. Our previous work dealt with a new concept on implementing the entirepersonali...
A Clustered Based Novel Approach of Graph Coloring
Abstract: An efficient graph coloring algorithm is proposed in this research paper that uses less number of colors for a graph coloring problem. The proposed algorithm is applicable for all types of graph. The algo...
Research on Clustering Method of Related Cases BasedOn Chinese Text
Abstract: With the movement of population, crimes are showing mobility and professionalism characteristics,the cases which the same suspects committed have the same or similar characteristics, it is helpful to find...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases
Privacy Preserving Data Mining(PPDM) is a rising field of research in Data Mining and various approaches are being introduced by the researchers. One of the approaches is a sanitization process, that transform...