Security issues occur in Cloud Computing and there Solutions

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5

Abstract

Cloud computing is a recent advancement wherein IT infrastructure and applications are provided as “services” to end-users under a usage-based payment model. Many organizations, such as Google, Amazon, IBM and many others, accelerate their paces in developing Cloud computing systems and providing services to user with best affords but there phases many difficulties regarding security problem and users also afraid toward security of own data i.e. whether cloud providers able to maintain data integrity ,confidentiality as well as authentication. To resolve the security issues in cloud computing, this paper presents various solutions for different issues.

Authors and Affiliations

Karamjit Singh , Isha Kharbanda , Navdeep Kaur

Keywords

Related Articles

An Efficient Data Link Protocol for Integrated Wireless Networks: Next Generation Networks (NGN)

The seamless integrated communication has a vital role in pervasive communication. It has implemented on next generation networking. There is various integration issues: coupling, decoupling, mobility, IP etc. In this pa...

Simulator for Software Project Reliability Estimation

Several models are there for software development processes, each describing approaches to a variety of tasks or activities that take place during the process. Without project management, software projects can easily be...

Dynamic Resource Allocation in Desktop Grids

Grid computing (or the use of computational grids) is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicati...

A Review of Feature Selection Algorithms for Data Mining Techniques 

Feature selection is a pre-processing step, used to improve the mining performance by reducing data dimensionality. Even though there exists a number of feature selection algorithms, still it is an active research area i...

SOFTWARE ARCHITECTURE RECOVERY WITH ERROR TOLERANCE AND PENALTY COST IN GRAPH MINING

In the vast literature Software architecture has been recovered through graphs During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the...

Download PDF file
  • EP ID EP108698
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Karamjit Singh, Isha Kharbanda, Navdeep Kaur (2012). Security issues occur in Cloud Computing and there Solutions. International Journal on Computer Science and Engineering, 4(5), 945-949. https://europub.co.uk/articles/-A-108698