Security Issues Model on Cloud Computing: A Case of Malaysia
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security viewpoint, several issues and problems were discussed regarding the cloud transfer. The goal of this study is to represent a general security viewpoint of cloud computing through signifying the security problems that must be focused and accomplished appropriately for identifying a better perspective about current world of cloud computing. This research also is to clarify the particular interrelationships existing between cloud computing security and other associated variables such as data security, virtual machine security, application security and privacy. In addition, a model of cloud computing security which depends on the investigation regarding previous studies has been developed. To examine the model a type of descriptive survey is applied. The survey sample population is selected from employers and managers IT companies in Malaysia. By testing the correlation, the results of study indicated that there are those identified security challenges in current world of cloud computing. Furthermore, the results showed that the cloud computing security correlation with data security, virtual machine security, application security and privacy is positive.
Authors and Affiliations
Komeil Raisian, Jamaiah Yahaya
Unsupervised Video Surveillance for Anomaly Detection of Street Traffic
Intelligent transportation systems enables the analysis of large multidimensional street traffic data to detect pattern and anomaly, which otherwise is a difficult task. Advancement in computer vision makes great contrib...
Cloud Computing Adoption in Small and Medium- Sized Enterprises (SMEs) of Asia and Africa
Cloud computing is a rapidly emerging technology over the last few years that has abolished the burden of purchasing heavy hardware and licensed software. Cloud computing has been advantageous to Small and Medium-sized E...
Human Face Classification using Genetic Algorithm
The paper presents a precise scheme for the development of a human face classification system based human emotion using the genetic algorithm (GA). The main focus is to detect the human face and its facial features and c...
A Routing Calculus with Distance Vector Routing Updates
We propose a routing calculus in a process algebraic framework to implement dynamic updates of routing table using distance vector routing. This calculus is an extension of an existing routing calculus DRωπ where routing...
An Integrated Architectural Clock Implemented Memory Design Analysis
Recently Low power consumption and Custom Memory design is major issue for embedded designer. Micro wind and Xilinx simulator implements SRAM design architecture and performs efficient simulation. These simulators implem...