Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

Changing Scenario of Doctor- Patient Relationship : A Consumerist approach

The doctor – patient relationship is very old and rapidly changing with the commercialization. Since 1991 several legal cases related to the medical negligence put a new picture of doctor – patient relationship & medica...

Consolidated Identity Management System for Secure Mobile Cloud Computing

Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of IT services on...

Security in Wireless Sensor Network

Wireless Sensor Network is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless commu...

Acute Mylogenous Leukemia Detection Using Blood Microscopic Images

Leukemia is a specific kind of cancer, where the blood cells i.e., RBC’s, leukocytes or WBC’s; lymphatic system or bone marrow gets affected. Blood tests aids in diagnosing blood cancer, where affected blood cells are e...

Improvement of Pavement Soil Subgrade by using Burnt Brick Dust

To stabilize the clayey soil, an experiment is conducted to evaluate the properties of soil blending with different percentage of Burnt Brick Dust of 10%, 20%, 30%, 40% and 50% by weight and then the tests are performed...

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 986
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://www.europub.co.uk/articles/-A-18598