SECURITY ISSUES IN CLOUD ENVIRONMEN
Main Article Content
Abstract
Cloud computing has provided software support for various systems from server to service consumer.. Growth of cloud computing leads to various risks and challenges for system. Devices connected over internet lead to threats and security risks. Cloud provided different level of abstraction to ensure risk and privacy. Cloud Computing is the biggest buzzwords in the computer world these days. It lets in useful resource sharing that consists of software, platform and infrastructure by virtualization. Virtualization is the center era behind cloud resource sharing.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
http://csrc.nist.gov/groups/SNS/cloudcomputing/index.html. [2] Cisco White Paper, http://www.cisco.com/en/US/solutions/collateral/ns341/ns 525/ns537/white_paper_c11-532553.html,published 2009, pp. 1-6. [3] John Viega, McAffee, Cloud Computing and the Common Man,†published on the IEEE Journal ON Cloud Computing Security, pp. 106-108, August 2009. [4] George Reese, “Cloud Application Architecturesâ€, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118. [5] http://en.wikipedia.org/wiki/Cloud_computing.
http://communication.howstuffworks.com/cloud computing1.htm. [7] John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the World of Cloud Computing,†published on the IEEE Journal on Cloud Computing Security, July/August 2009, Vol. 7, No.4, pp. 61-64. [8] John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Securityâ€, CRC Press, August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212. [9] Dinesh R. C, Ashwin R, "Multi-Agent based Cloud Services", International Journal of Computer Applications, Vol.2, No.1, 2012, pp. 7-10 [10] Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer, “ Retaining Data Control to the Client Infrastructure Cloudsâ€, published on the IEEE, 2009 International Conference on Availability, Reliability and Security, pp. 9-15.