Cloud Computing Threats

Abstract

The progress of cloud computing services is accelerating the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloudremains attractive trend from a financial perspective.Development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Security is a key requirement for cloud computing combine as a robust and feasible versatile solution. Central component of managing risks in cloud computing is to understand the nature of security threats. Recognizing both the promise of cloud computing, and the risks associated with ithere we identify critical areas in cloud computing andunderstand cloud security threats in order to make educated risk-management decisions regarding cloud adoption strategies. This report focuses on threats specifically related to the shared, on-demand nature of cloud computing.

Authors and Affiliations

Vibha Sahu, Brajesh Dubey,, Dr. S. M. Ghosh

Keywords

Related Articles

Seismic & Stability Analysis of Gravity Dam

The aim of the study is to analyse the dam for stability and seismic forces. Dam being one of the mega structure it becomes prime important to design and analyse such structure with keen observation considering various...

Design and Analysis of Leaf Spring Using Composite Materials

This project describes design and experimental analysis of composite leaf spring made of glass fiber reinforced polymer. The objective is to compare the load carrying capacity, stiffness and weight savings of composite...

Design of Sewage Treatment Plant to Recycle Waste Water Produced From Residential Buildings

In this present scenario, the primary objective of this proposal of treatment plant design is to restore the availability of water resources and its optimal usage. Another foremost objective of this investigation is to...

A Robust But Flexible Privacy Preserving Scheme Supporting Cloud Environments

Fog is the Ruby cloud services library. The fog binary allows quick and easy access to configured cloud services. Whether you need compute, storage, or a multitude of other services, fog provides an accessible entry poi...

Op-amp based railway track crack detection System with GSM technique

In the rapidly flourishing country like ours, accidents in the unmanned level crossings are increasing day by day no fruitful steps have been taken so far in these areas. In India, we find that rail transport occupies a...

Download PDF file
  • EP ID EP18598
  • DOI -
  • Views 885
  • Downloads 25

How To Cite

Vibha Sahu, Brajesh Dubey, , Dr. S. M. Ghosh (2014). Cloud Computing Threats. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(8), -. https://www.europub.co.uk/articles/-A-18598