Security in Cloud Computing - A Review

Abstract

In modern computing, Cloud computing is an important part of any small or large organization. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. network, storage, software application), whenever required, without being concerned with the complex underlying technology and infrastructure architecture. The most important feature is that the computing resources are available whenever they are needed. Additionally, users pay only for the resource they actually use. As a result, cloud users can easily scale their information technology infrastructure, based on their business policy and requirements. However, there is often a lack of security when realizing such cloud-based solutions. In the longer term, the problems caused by this lack of security might inhibit companies from taking advantage of cloud-based solutions. This paper provides literature review on various methods for implementing security in cloud environment.

Authors and Affiliations

Ruchi . , Ms. Kompal Ahuja

Keywords

Related Articles

A Three Way Visual Cryptography & its Application in biometric Security : A Review

Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image...

High Density Impulse Noise Removal of Color Image Using Bilateral Filter

Generally, image restoration is an important task in any image processing system. In many image-processing applications, observed images are contaminated by a non stationary noise and no a priori information on noise de...

Behavioural Modelling Of Single Stage Discrete Time Sigma Delta Modulator

Modulator is one of the most significant building-blocks in integrated discrete time component used in SigmaDelta (ΣΔ) analog to digital converter. In this paper a novel structure of a discrete time first order modulator...

Survey Paper on Computerized Cough Analysis by Using Wavelet for Pneumonia Diagnosis

Abstract-Respiratory diseases, such as pneumonia, bronchitis leading causes of child death in the word .out of this pneumonia are cause the million children death each year around the word. One of the challenged faced i...

Shear Strengthening of R.C. Beams by using GFRP

Shear is actually a very complex problem and is not completely solved for simple reinforcement concrete beams. The current codes (American Concrete Institute (ACI), ISIS Canada and I.S.456:2000) qualify the nominal shea...

Download PDF file
  • EP ID EP24879
  • DOI -
  • Views 513
  • Downloads 17

How To Cite

Ruchi . , Ms. Kompal Ahuja (2017). Security in Cloud Computing - A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(7), -. https://europub.co.uk/articles/-A-24879