Review in Cloud Computing Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract:The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation of Cloud over the Network. Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Problem is that Clouds typically have single security architecture but have many customers with different demands and we attempt to solve this problem. In this we need to provide availability of data by overcoming many existing problems like Data Leakage , Data Integrity and Privacy Protection. To learn about cloud computing security, a review process involving 2 stage approaches has been undertaken for 20 research papers which were published in the period of year 2010 to year 2013. After an exhaustive review process, four key issue were found “Security and privacy, Data Leakage and weakness, Data integrity problem and Data Hiding in cloud Computing.” which is mostly need to enhance of Cloud Security aspects to get better Data accessibility over network. Several solution approaches have been found in the 20 papers. The outcome of the review was in the form of various findings, found under various key issues. The findings included algorithms and methodologies used to solve particular research problem, along with their strengths and weaknesses and the scope for the future work in the area.
Authors and Affiliations
Anchal Pokharana , Shweta Meena
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...
Remote Android Assistant with Global Positioning System Tracking
The paper describes a method which binds a web application and an Android mobile application, to,provide remote exploration services. A remote exploration system has been developed using web server,database, and an Andro...
A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...
Self Appreciating Concept Based Model For Cross Domain Document Classification
Abstract : In text mining, text categorization is an important technique for classifying the documents. Most of the times statistical approaches that are based on analysis of the term in the form of frequency of th...
Soft Phone Support Voice and Video Calling Using Sip And Rtp Protocol
Soft Phone is a VoIP soft phone that uses the Session Initiation Protocol. It is a powerful and unique SIP software telephone that lets users make phone and video calls using single software application using any Voice o...