Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Computing and Security

Neeraj Kaushik, Ashish Kumar Sharma

Abstract


Cloud Computing has been information technologies services on developed to deliver
demand to organizations like as individual users, this technology is still in its early stages of
development because it suffers from different security threats that prevent users trust it. In
this paper, we identify different security problems existing in cloud from several research
papers and we show suggested solutions. This cross cloud speaks to next logical wave in
processing, empowering complex mixture applications, cost and execution improvement,
upgraded dependability, client adaptability and secure evasion. Providing testing as a service
in cross clouds become hot topics in industry.

Full Text:

PDF

References


S.K. Jameela, K. Thirupathi Rao.

Testing of cloud applications in

cross-cloud

environment,

In:Research Challenges for Cross-Cloud

Applications by Felix Cuadrado.

P. Mill, T. Grance. The NIST

Definition of Cloud Computing, In:

National Institute of Standards and

Technology. Gaitherbsburg, NIST

Special Publication 800-145.

E. Messmer. “New security demands

arising for virtualization, cloud

computing”, 2011, http://www.networ

kworld.com/article/2178628/virtualiz

ation/gartner--new-security-demands-

arising-for-virtualization--cloud-

computing.html.

S. Kaushik, A. Singhal. Network

security using cryptographic

techniques, 2012; 2(12).

Charles Miers, Fernando Redigolo &

Marcos Simplicio. A quantitative

analysis of current security concerns

and solutions for cloud computing, J

Cloud Comput Adv Syst Appl. 2012.

doi:10.1186/2192-113X-1-11.

R.P. Padhay. “An Enterprise Cloud

Model for Optimizing IT

Infrastructure”, Int J Cloud Comput

Servic Sci. 2012; 1(3): 123–33p.

ISSN: 2089-3337. http://iaesjourna

l.com/online/index.php/ IJ-CLOSER.

N. Gonzalez, et al. A quantitative

analysis of current security concerns

& solutions for cloud computing, J

Cloud Comput Adv Syst Appl. 2012.

doi:10.1186/2192-113X-1-11

The

electronic version of this article is

complete one & could be found

IJDS (2017) 1–3 © JournalsPub 2017. All Rights Reserved

online at: http://www.journalofcloudc

omputing.com/ content/1/1/11.

CSA. “Security Guidance for Critical

Areas of Focus in Cloud

Computing”, Tech. Rep., Cloud

Security Alliance. 2009.




DOI: https://doi.org/10.37628/ijods.v3i2.315

Refbacks

  • There are currently no refbacks.