Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
…
3 pages
1 file
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud
2016
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services must understand the dangers of uploading information into the new atmosphere. Therefore, in this paper we are proposing a different type of security techn...
A new computational paradigm called cloud computing that offers an innovative business model for organizations to adopt IT. Cloud Computing provide a flexible IT architecture, accessible through network and world wide web from lightweight portable devices that allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption.The security problem becomes more complicated under the cloud model as new dimensions have entered into the problem scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. This paper, discussed security issues for cloud computing and the problems are investigated from the cloud architecture perspective, the cloud offered characteristics perspective, the cloud stakeholders' perspective, and the cloud service delivery and deployment model models perspective. Based on this analysis, we elaborate the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
IARJSET, 2015
Cloud computing is a promising technology to facilitate the development of large-scale, on-demand, flexible computing infrastructures. Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organization automatically introduced new risk on top of existing risk. Obviously, putting everything into a single box i.e. into the cloud will only make it easier for hacker. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. This paper presents an overview and the study of the cloud computing along with several securities and challenging issues.
International Journal of Cryptocurrency Research, 2021
Recently, cloud computing-which describes the use of a collection of distributed services, applications, information, and infrastructure comprised of pools of computers, networks, information, and storage resources-has grown from being a promising business concept to one of the fast-growing segments of the IT industry. It extends Information Technology's (IT) existing capabilities. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. However, security has always been seen as the biggest barrier to putting applications in the cloud. Encryption, authentication, and other security issues are real threats when it comes to adopting cloud computing. When we are talking about data security, issues like data breach liability and data privacy are bound to arise. This paper extends the work that has earlier been established (
IOSR Journal of Computer Engineering, 2017
Clouds give an intense figuring stage that empowers people and associations to perform assortment levels of undertakings, for example, utilization of online storage room, selection of business applications, improvement of tweaked PC programming, and formation of a "practical" system condition. In earlier years, the quantity of individuals utilizing cloud administrations has drastically expanded and loads of information has been put away in Cloud computing situations. Meanwhile, information breaks to cloud administrations are likewise expanding each year because of programmers who are continually attempting to misuse the security vulnerabilities of the design of cloud. In this paper, three cloud benefit models were thought about; cloud security dangers and dangers were researched in light of the way of the cloud benefit models.True cloud assaults were incorporated to exhibit the methods that programmers utilized against Cloud computing frameworks. Likewise, countermeasures to cloud security ruptures are exhibited.
Ijca Proceedings on International Conference on Recent Trends in Information Technology and Computer Science 2012, 2013
Cloud computing has become new trend, which many enterprises wants to incorporates in their working. Since it relies on sharing of computing resources rather than having local servers or personal devices to handle applications. Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS)[3] It is used in consumer-oriented applications such as financial portfolios delivering personalized information, or power immersive computer games. The cloud computing however, has not gained wide acceptance. For which the main reason is security issue. Cloud computing is surrounded by many security issues like securing data, data integrity and examining the utilization of data in cloud by the cloud computing vendors This paper is study of various security threats posed to the data stored in cloud and also threats concerned to both user and vendors in cloud computing. This is a literature survey of various key security threats associated with cloud computing. It also includes a critical analysis of various research papers on same grounds. At the same time it discusses various security models and tools proposed in those papers in order to protect data confidentiality and provide security to the data in cloud computing.
Journal of Interdisciplinary Cycle Research, 2020
Cloud computing allows you to share advantages over the Internet with the use of Internet composites, group of jobs, extra room and various programming initiatives. Cloud master associations can lease different benefits to customer needs and companies can pay for cloud client businesses. Nonetheless, the various security issues related to all cloud benefits, programming, virtualization, hardware, architectures, multitenant data and master associations are a fundamental barrier to cloud allocation in the IT business. 3 depicts security responses to prevent these risks, 4 Finishing the paper.
Cloud computing is the practice of using a network on the Internet to store, manage and process data. The resources can be shared and stored on the Internet instead of computer’s hard drive. It is a convenient way to secure company’s information over the Internet by allowing firms to store and process data electronically thus leading firms to achieve economies of scale by lowering the infrastructure cost which in turn encourages firms to be cost-effective and eventually be more productive. Thus, it is very reliable and efficient way, which allows maximum utilization of recourses. However, by doing centralization, it may increase security-related issues, which can be dealt by using proper security techniques. Therefore despite numerous benefits such as easy to use and storage and management of large quantity of data over the Internet, there are threats as well that targets the security of clients data. The paper talks about the security concerns of cloud computing and put forwards the solutions that might help in reducing such risks. To have a secure cloud platform, cloud users and server must cooperate with each other. Moreover, an efficient cloud infrastructure must be proposed to reduce the security concerns of users. The three main components to secure cloud computing include confidentiality, integrity, and authentication of client’s data. Confidentially in cloud infrastructure enables the client’s data to remain secure and confidential from sensitive interference. To ensure data’s confidentiality, homomorphic encryption is necessary which enables computation on encrypted data. Although it is difficult to process and analyze encrypted data homomorphic encryption helps in processing encrypted data and thus secure the data’s confidentiality.
Asian Journal of Applied Science and Technology, 2020
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service.
Sangam University Publication, 2024
Verbum Et Ecclesia, 2010
International Journal of …, 2007
University of Kansas publications, Museum of Natural History, 1969
Critical Analysis, 2024
Aus Politik und Zeitgeschichte 42-44, 2020
La Repubblica – Palermo, Venerd' 13 ottobre 2006
MGG Molecular & General Genetics, 1994
Atmospheric Chemistry and Physics, 2003
Genes to cells : devoted to molecular & cellular mechanisms, 2017
Journal of Cell Biology, 2010
Explorations in Empirical Translation Process Research, 2021
Journal of Neuroscience, 2010
Tetrahedron Letters, 2006
The Oxford Handbook of Women, Peace, and Security, 2018
The Lancet Diabetes & Endocrinology, 2015