slugA Survey on Current Cloud Computing Trends and Related Security Issues
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 1
Abstract
Cloud Computing is an emerging technology which provides services on the basis of as you pay as you go. It provides resources (e.g. CPU and storage) as general utilities that can be leased and released by users through the internet in an on-demand fashion. But deploying cloud computing in an enterprise infrastructure brings significant security concerns. Though cloud computing have an economical computation over the current infrastructure, but implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. In this paper, we have discussed the architecture and business model of cloud computing along with the security issues related to its implementation. We presented the security issues by considering both’s ( User & Providers) point of view. We also focused lights on the techniques presented by the researcher to provide security in cloud computing environment.
Authors and Affiliations
Rachna Jain, Reena Singh
Determination of Optimal Meeting Location for Preserving on Mobile Devices
Presently a-days, individuals of urban and rustic are utilizing PDAs and cell phones seriously. Specifically urban populace relies on upon the applications and devices which are given by the cell phones and PDAs to arra...
Remulation-Based Keyboard Evaluation System: A Review Paper
Remulation, a complementary method for evaluating touchscreen keyboard correction and recognition algorithms. It replicates prior user study data through real-time, on-device simulation. Octopus is an evaluation tool th...
An Automated Non-Invasive Blood Glucose Estimator and Infiltrator
This paper presents design and working of a microcontroller based non-invasive blood glucose estimator and an automated insulin injector for worst-case automatically. The emergence of this concept is to overcome the inv...
Comparative Analysis of Hybrid DKT-DCT with DKT and DCT in Image Compression
Image compression is one of the prominent applications of image processing. It has triggered the need of data compression so that volume of data and bandwidth required to transmit it can be reduced. Still image compress...
Bot Detection using Traffic Monitoring and Traffic Analysis
Botnet is peak extensive spread and occurs normally in today’s cyber attacks, resulting in severe intimidations to our network possessions and group’s properties. Botnets are congregation of negotiated computer (Bots) w...