Confidentiality for cloud computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on -demand provisioning with little or no sincere IT infrastructure investment costs. This paper discusses to which degree this is justified, by presenting the Cloud Computing Confidentiality Model (CCCM). The CCCM is a step-by-step model that creates mapping from data sensitivity onto the most suitable cloud computing architecture. To achieve this, the CCCM determines first of all the security mechanisms required for each data sensitivity level, secondly which of these security controls may not be supported in certain computing environments, and finally which solutions can be used to manage with the identified security limitations of cloud computing. The most systematic security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures, while they can be realized in private cloud computing architectures. In this thesis I Suggests hybrid cloud model.
Authors and Affiliations
Vibha Sahu, Praveen Shrivastav, Dipti Chhatri, Dr. S. M. Ghosh
Wireless Electronic Notice Board Using Raspberry Pi 3
Notice boards can change the way communication with each other, using notice boards is a constructive method of promoting important information to a large number of people. Notice board is ideally useful tool for organi...
Computational Performances of OFDM using Different Pruned Radix FFT Algorithms
The Fast Fourier Transform (FFT) and its inverse (IFFT) are very important algorithms in signal processing, software-defined radio, and the most promising modulation technique i.e. Orthogonal Frequency Division Multiple...
Foreign Banks operating in India with specific business practices models and their Scenario Post RBI Road Map 2005
During the last two decades, India has seen an unprecedented degree of globalization especially in financial services. At present the cross border financial flows have increased dramatically. Many foreign banks from bot...
Study On SQL Injection Attacks: Detection And Prevention
SQL injection also referred to as SQLI in short. It is the most dangerous way in which our data can be hacked. Hackers can get to our databases prudently through Web Interface and can delete, modify the important conten...
Design and Implementation of Pyramidal Horn Antenna
This technical paper presents design and implementation of pyramidal horn antenna. Antenna is a transducer used to convert electrical signals into electromagnetic waves i.e. radio waves. Horn antenna supports wide range...