Survey on Security Issues and Solutions in Cloud Computing
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 3
Abstract
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Cloud computing weakness include list of issues such as the security and privacy of business data being hosted in remote 3rd party data centers, being lock-in to a platform, reliability/performance concerns, and the fears of making the wrong decision before the industry begins to mature. We show Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats and possible countermeasures. This paper show how we secure the cloud security, privacy and reliability when a third party is processing sensitive data. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources.
Authors and Affiliations
D. Gnanavelu , Dr. G. Gunasekaran
Battery-Powered Mobile Computer using Denial of Service
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of...
Affective Embedded Systems: a Requirement Engineering Approach
This paper proposes an embedded system development process able to deal with affectivity requirements. This process includes W3C tools, such as EmotionML and SysML, in order to specify cognition and affectivity as system...
Powder Milk Rn222 Exhalation Rate Measurements in Different Kinds
The application of CR-39 SSNTD technique to the determination of radioactive contaminants in different kinds of milk can be very useful. Radon concentrations in animal milk samples collected from different countries were...
Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS
Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...
Anomaly Extraction in Networks
The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to ident...