An Analysis of Security Challenges in Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 1
Abstract
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss of sensitive data, data leakage and few others related to cloning, resource pooling and so on. As far as security issues are concerned, a very wide study has been reviewed which signifies threats with service and deployment models of cloud. In order to comprehend these threats, this study is presented so as to effectively refine the crude security issues under various areas of cloud. This study also aims at revealing different security threats under the cloud models as well as network concerns to stagnate the threats within cloud, facilitating researchers, cloud providers and end users for noteworthy analysis of threats.
Authors and Affiliations
Ms. Disha H. Parekh , Dr. R. Sridaran
Predicting Fork Visibility Performance on Programming Language Interoperability in Open Source Projects
Despite a variety of programming languages adopted in open source (OS) projects, fork variation on some languages has been minimal and slow to be adopted, and there is little research as to why this is so. We therefore e...
A Blockchain-based Value Added Tax (VAT) System: Saudi Arabia as a Use-Case
Businesses need trust to confidently perform trade among each other. Centralized business models are the only mature solutions available to perform trades over the Internet. However, they have many problems which include...
An Internet of Things (IOT) based Smart Parking Routing System for Smart Cities
Recently, the number of cars on the road has been growing due to the increase in car manufacturing in parallel with customer services provided to help the new driver to buy cars at affordable prices. On the other hand, w...
Loop Modeling Forward and Feedback Analysis in Cerebral Arteriovenous Malformation
Cerebral Arteriovenous Malformation (CAVM) hemodynamic in disease condition results changes in the flow and pressure level in blood vessels. Cerebral Arteriovenous Malformation (CAVM) is an abnormal shunting of vessels b...
An efficient user scheduling scheme for downlink Multiuser MIMO-OFDM systems with Block Diagonalization
The combination of multiuser multiple-input multiple-output (MU-MIMO) technology with orthogonal frequency division multiplexing (OFDM) is an attractive solution for next generation of wireless local area networks (WLANs...