Security Issues and Privacy in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a critical concern. Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments. We have identified five most representative security and privacy attributes (i.e., confidentiality, integrity, availability, accountability, and privacy-preservability). Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Future research directions are previously determined for each attribute.
Authors and Affiliations
K. Durkesh , Ms. J. R. Thresphine
An Effective Method to Hide Texts Using Bit Plane Extraction
Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted usingMatlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned tas...
A Survey Report on the Novel Approach on Use ofRecommendation Outline in Query Recommender System
Abstract: The DBMS applications are becoming increasingly popular in the scientific community to supportthe interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated i...
Educational Process Mining-Different Perspectives
Process mining methods have in recent years enabled the development of more sophisticated Process models which represent and detect a broader range of student behaviors than was previously possible. This pa...
A Non Conventional Energy Based Mobile Charger towards Green Computing
Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twi...
Implementing Automatic Callback Using Session Initiation Protocol
TheSession Initiation Protocol (SIP), is an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. SIP is developed by SIP working gr...