Security issues occur in Cloud Computing and there Solutions
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5
Abstract
Cloud computing is a recent advancement wherein IT infrastructure and applications are provided as “services” to end-users under a usage-based payment model. Many organizations, such as Google, Amazon, IBM and many others, accelerate their paces in developing Cloud computing systems and providing services to user with best affords but there phases many difficulties regarding security problem and users also afraid toward security of own data i.e. whether cloud providers able to maintain data integrity ,confidentiality as well as authentication. To resolve the security issues in cloud computing, this paper presents various solutions for different issues.
Authors and Affiliations
Karamjit Singh , Isha Kharbanda , Navdeep Kaur
An Efficient Data Link Protocol for Integrated Wireless Networks: Next Generation Networks (NGN)
The seamless integrated communication has a vital role in pervasive communication. It has implemented on next generation networking. There is various integration issues: coupling, decoupling, mobility, IP etc. In this pa...
Simulator for Software Project Reliability Estimation
Several models are there for software development processes, each describing approaches to a variety of tasks or activities that take place during the process. Without project management, software projects can easily be...
Dynamic Resource Allocation in Desktop Grids
Grid computing (or the use of computational grids) is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicati...
A Review of Feature Selection Algorithms for Data Mining Techniques
Feature selection is a pre-processing step, used to improve the mining performance by reducing data dimensionality. Even though there exists a number of feature selection algorithms, still it is an active research area i...
SOFTWARE ARCHITECTURE RECOVERY WITH ERROR TOLERANCE AND PENALTY COST IN GRAPH MINING
In the vast literature Software architecture has been recovered through graphs During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the...