SECURITY ISSUES IN CLOUD ENVIRONMEN

Main Article Content

Menakarani R
Malathi Kulkarni
Rekha R Suryawanshi
Mir Abdul Samim Ansari,

Abstract

Cloud computing has provided software support for various systems from server to service consumer.. Growth of cloud computing leads to various risks and challenges for system. Devices connected over internet lead to threats and security risks. Cloud provided different level of abstraction to ensure risk and privacy. Cloud Computing is the biggest buzzwords in the computer world these days. It lets in useful resource sharing that consists of software, platform and infrastructure by virtualization. Virtualization is the center era behind cloud resource sharing.


Downloads

Download data is not yet available.

Article Details

Section
Articles

References

http://csrc.nist.gov/groups/SNS/cloudcomputing/index.html. [2] Cisco White Paper, http://www.cisco.com/en/US/solutions/collateral/ns341/ns 525/ns537/white_paper_c11-532553.html,published 2009, pp. 1-6. [3] John Viega, McAffee, Cloud Computing and the Common Man,†published on the IEEE Journal ON Cloud Computing Security, pp. 106-108, August 2009. [4] George Reese, “Cloud Application Architecturesâ€, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118. [5] http://en.wikipedia.org/wiki/Cloud_computing.

http://communication.howstuffworks.com/cloud computing1.htm. [7] John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the World of Cloud Computing,†published on the IEEE Journal on Cloud Computing Security, July/August 2009, Vol. 7, No.4, pp. 61-64. [8] John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Securityâ€, CRC Press, August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212. [9] Dinesh R. C, Ashwin R, "Multi-Agent based Cloud Services", International Journal of Computer Applications, Vol.2, No.1, 2012, pp. 7-10 [10] Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer, “ Retaining Data Control to the Client Infrastructure Cloudsâ€, published on the IEEE, 2009 International Conference on Availability, Reliability and Security, pp. 9-15.