Security in Cloud Computing - A Review

Abstract

In modern computing, Cloud computing is an important part of any small or large organization. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. network, storage, software application), whenever required, without being concerned with the complex underlying technology and infrastructure architecture. The most important feature is that the computing resources are available whenever they are needed. Additionally, users pay only for the resource they actually use. As a result, cloud users can easily scale their information technology infrastructure, based on their business policy and requirements. However, there is often a lack of security when realizing such cloud-based solutions. In the longer term, the problems caused by this lack of security might inhibit companies from taking advantage of cloud-based solutions. This paper provides literature review on various methods for implementing security in cloud environment.

Authors and Affiliations

Ruchi . , Ms. Kompal Ahuja

Keywords

Related Articles

Secure Private Data Release In Vertical Partitioned Data

When mining the useful information some privacy preserving data publishing addresses the problem of exposing the sensitive data. In this paper, the source database table is divided into some parties which hold different...

Numerical Analysis and Optimization of Passenger Car Drive Shaft

The main objective of the drive shaft is reduction of weight of passenger car. Drive shaft is one of the most important parts of the vehicle which transfers the motion from gear box to the rear wheel of the vehicle. The...

Voice Recognition Technique: A Review

Voice Recognition is a biometric technology which is used to recognize a particular individual voice. The speech waves of particular voice form the basis of identification of speaker. We can use voice identification in...

Light Weight Access Control System for Constrained IOT Devices

This paper presents a low cost and flexib le home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based...

Investigation of Biogas Flow Analysis in Mixing Chamber by Using CFD, Performance and Emission Characteristics of Single Cylinder SI Engine

In this work, Design and fabrication of mixing chamber for biogas supply to the engine and CFD analysis of the mixing Chamber. Biogas is used as fuel for SI engine by the help of pressure conversion kit, study of differ...

Download PDF file
  • EP ID EP24879
  • DOI -
  • Views 479
  • Downloads 17

How To Cite

Ruchi . , Ms. Kompal Ahuja (2017). Security in Cloud Computing - A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(7), -. https://europub.co.uk/articles/-A-24879