Security Information and Assurance in a Cloud Computing Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Cloud computing is the use of computing resources that are delivered as a service over a network. Today, cloud computing generates a lot of excitement. It is both promising and daunting. Businesses world see its potential but also have many issues for discussion. Cloud computing offers attractive financial and technological advantages but some of them has not been fully evaluated with respect to security. Security is considered one of the most critical aspects in cloud computing due to the sensitivity and importance of data stored in the cloud. Cloud Computing has several major issues such as data security, trust, expectations, regulations, and performance. This paper discusses the privacy and security issue of cloud computing and some existing security solutions about Distributed Denial-of- Service (DDoS) attacks, Intrusion Detection Systems (IDSs), Antivirus (AV), and Email Security, suggested by some researchers.
Authors and Affiliations
Swathi. K, Vijayanathan R
The Role of Information Technology on Agricultural Production in Nigeria
Effective communication of agricultural information to farmers is crucial in achieving optimum efficiency in agricultural production in Nigeria. IT can help an average Indian farmer to get relevant information regarding...
Techniques for Inventory Classification: A Review
This Optimal Inventory levels is extremely crucial for maintaining appropriate service levels. But, inventory can be also be expensive to hold and to move around. Classification of Inventory is extremely essential to id...
Shadow Detection and Its Removal from Images Using Advance Strong Edge Detection Method (ASED)
Shadow causes dilemma during the recognition of objects from images in different computer vision applications, so it is a very critical job to confiscate shadow from images that’s why in this paper a new method for shad...
Cost based Selection of Cloud Providers using Broker in Multi Cloud Environment
In cloud computing resources are provided to customers based on their priorities and their requests, but sometimes non-cloud provider organizations also want to share their unused resources through cloud broker to same...
Image Predictions and Classifications with Certificate Secure Policy
Our social network is an add electronic service for data sharing sites. It is add service which provides a reliable communication, through this communication and new fast searching service; they can easily wrong use the...