Study of Challenges for Cloud Computing and Cloud Security
Keywords:
Cloud Computing, Cloud Security, Cloud ChallengesAbstract
The objective of cloud computing is to apply customary supercomputing, or the power of high performance computing, typically used by military and research facilities to perform tens of trillions of calculations per second, application -oriented consumer, such as financial portfolios, to offer personalized information to provide data storage or feeding large immersive computer games. In this paper, we review the different security issues and challenges faced during deployment of cloud environment.
References
- Kaufman, L.M. “Data Security in the world of cloud computing”, Security and Privacy, IEEE Vol. 7, No. 4, pp. 61-64, 2009.
- Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S., Cloud computing features, issues, and challenges: a big picture. IEEE International Conference on Computational Intelligence and Networks (CINE), pp. 116-123, 2015
- Hendre, Amit, and Karuna Pande Joshi. "A semantic approach to cloud security and compliance." IEEE 8th International Conference on Cloud Computing. pp. 1081-1084, 2015.
- Youngmin, J. and Mokdong, C. “Adaptive security management model in cloud computing environment”, In the 12th International Conference on Advanced Communication Technology (ICACT), pp 1664-1669, 2010.
- Bret, M. “In Clouds Shall we Trust?,” Security and Privacy, IEEE, Vol7, No.5, p 3, 2009.
- Stanojevi, R. and Shorten, R. “Fully decentralized emulation of best- effort and processor sharing queues”, In ACM SIGMETRICS international conference on Measurement and modeling of computer systems, ACM Press, New York 2008, pp. 383-394, 2008.
- Hashizume, Keiko, et al. "An analysis of security issues for cloud computing." Journal of Internet Services and Applications 4.1, pp. 5, 2013.
- Ahmed, Monjur, and Mohammad Ashraf Hossain. "Cloud computing and security issues in the cloud." International Journal of Network Security & Its Applications 6.1, pp 25, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.