Confidentiality for cloud computing

Abstract

Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on -demand provisioning with little or no sincere IT infrastructure investment costs. This paper discusses to which degree this is justified, by presenting the Cloud Computing Confidentiality Model (CCCM). The CCCM is a step-by-step model that creates mapping from data sensitivity onto the most suitable cloud computing architecture. To achieve this, the CCCM determines first of all the security mechanisms required for each data sensitivity level, secondly which of these security controls may not be supported in certain computing environments, and finally which solutions can be used to manage with the identified security limitations of cloud computing. The most systematic security controls needed to protect the most sensitive data may not be guaranteed in public cloud computing architectures, while they can be realized in private cloud computing architectures. In this thesis I Suggests hybrid cloud model.

Authors and Affiliations

Vibha Sahu, Praveen Shrivastav, Dipti Chhatri, Dr. S. M. Ghosh

Keywords

Related Articles

Wireless Electronic Notice Board Using Raspberry Pi 3

Notice boards can change the way communication with each other, using notice boards is a constructive method of promoting important information to a large number of people. Notice board is ideally useful tool for organi...

Computational Performances of OFDM using Different Pruned Radix FFT Algorithms

The Fast Fourier Transform (FFT) and its inverse (IFFT) are very important algorithms in signal processing, software-defined radio, and the most promising modulation technique i.e. Orthogonal Frequency Division Multiple...

Foreign Banks operating in India with specific business practices models and their Scenario Post RBI Road Map 2005

During the last two decades, India has seen an unprecedented degree of globalization especially in financial services. At present the cross border financial flows have increased dramatically. Many foreign banks from bot...

Study On SQL Injection Attacks: Detection And Prevention

SQL injection also referred to as SQLI in short. It is the most dangerous way in which our data can be hacked. Hackers can get to our databases prudently through Web Interface and can delete, modify the important conten...

Design and Implementation of Pyramidal Horn Antenna

This technical paper presents design and implementation of pyramidal horn antenna. Antenna is a transducer used to convert electrical signals into electromagnetic waves i.e. radio waves. Horn antenna supports wide range...

Download PDF file
  • EP ID EP19159
  • DOI -
  • Views 285
  • Downloads 5

How To Cite

Vibha Sahu, Praveen Shrivastav, Dipti Chhatri, Dr. S. M. Ghosh (2014). Confidentiality for cloud computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://www.europub.co.uk/articles/-A-19159