Open Access Open Access  Restricted Access Subscription or Fee Access

Applying of Clod Computing Strategy in Risk Management

R. K. Meenakshi


The commencement of cloud computing in recent years has been produced an interest from different fields like organizations, institutions and users. The cloud computing promises the new economic model for the Information Technology (IT) department. Cloud computing also promises scalability of resources and on-demand availability of resources. Cloud computing is the online storage of information and the people from different areas like consumers, companies, and governments utilize it, how they process ‘that information. It can be an engine of innovation, a platform for entrepreneurship, and driver of corporate efficiency.


Cloud Computing, Organization, Resources, Platform, Entrepreneurship

Full Text:



A Risk Assessment Framework for Cloud Computing, Karim Djemame, Member, IEEE, Django Armstrong, Jordi Guitart, and Mario Macias, Vol 4, Issue 3, 2016.

R. Buyya, C.S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In The 10th IEEE international conference on high performance computing and communications, pages 5–13, 2008.

Cloud Computing Risks, By Richard Mosher – ISSA member, Kansas City, USA Chapter, july 2011.

L. Ertaul, S. Singhal, and G. Saldamli. Security challenges in cloud computing. California State University, East Bay. Academic paper http://www. mcs. csueastbay. edu/ lertaul/Cloudpdf, 2009

Eystein Mathisen. Security challenges and solutions in cloud computing. In Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on, pages 208–212, 2011.

Hammami, N. Simoni, and R. Salman. Ubiquity and QoS for cloud security. In 2012 41st International Conference on Parallel Processing Workshops (ICPPW), pages 277 –278, September 2012

Huiming Yu, Nakia Powell, Dexter Stembridge, and Xiaohong Yuan. Cloud computing and security challenges. In 50th Annual Association for Computing Machinery Southeast Conference, ACM-SE’12, March 29, 2012 - March 31, 2012, Proceedings of the Annual Southeast Conference, pages 298–302. Association for Computing Machinery, 2012.

Jianyong Chen, Yang Wang, and Xiaomin Wang. On-demand security architecture for cloud computing. Computer, 45(7):73–78, 2012.

M. Jensen, J. Schwenk, N. Gruschka, and L.L. Iacono. On technical security issues in cloud computing. In 2009 IEEE International Conference on Cloud Computing, pages 109–116, 2009.

A Study on Cloud Computing Security Challenges, Santosh Bulusu Kalyan Sudia, 82, 2012.

Knorr, E. and Gruman, G. (2011), What cloud computing really means. Retrieved on Dec. 5, 2011 from .

Mohamed Hamdi. Security of cloud computing, storage, and networking. In Collaboration Technologies and Systems (CTS), 2012 International Conference on, pages 1–5, 2012.

Risk Management Considerations in Cloud Computing Adoption, Executive Briefing, August 2012 Eileen Doherty, Dr Marian Carcary and Gerard Conway

Risk Management for Cloud Computing Security concerns remain a hurdle to expansive cloud adoption. Learn how to apply security protocols to your organization’s cloud computing endeavors.

The Risk Management Strategy of Applying Cloud Computing- Chiang Ku Fan AND Tien-Chun Chen, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 9, 2012.

N. K. Sehgal, Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and J. M. Acken. A cross section of the issues and research activities related to both information security and cloud computing. IETE Technical Review, 28(4):279, 2011

Sen, J. & Sengupta, I. (2005). Autonomous Agent-Based Distributed Fault-Tolerant Intrusion Detection System. In Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT’05), pp. 125-131, December, 2005, Bhubaneswar, India. Springer LNCS Vol 3186

Sen, J., Sengupta, I., & Chowdhury, P.R. (2006b). An Architecture of a Distributed Intrusion Detection System Using Cooperating Agents. In Proceedings of the International Conference on Computing and Informatics (ICOCI’06), pp. 1-6, June, 2006, Kuala Lumpur, Malaysia.

Sen, J., Ukil, A., Bera, D., & Pal, A. (2008). A Distributed Intrusion Detection System for Wireless Ad Hoc Networks. In Proceedings of the 16th IEEE International Conference on Networking (ICON’08), pp. 1-5, December 2005, New Delhi, India.

Sen, J. (2010a). An Agent-Based Intrusion Detection System for Local Area Networks. International Journal of Communication Networks and Information Security (IJCNIS), Vol 2, No 2, pp. 128-140, August 2010.

Sen, J. (2010b). An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. In Proceedings of the 2nd IEEE International Conference on Intelligence in Communication Systems and Networks (CICSyN’10), pp. 202-207, July, 2010, Liverpool, UK.

Sen, J. (2010c). A Robust and Fault-Tolerant Distributed Intrusion Detection System. In Proceedings of the 1st International Conference on Parallel, Distributed and Grid Computing (PDGC’10), pp. 123-128, October 2010, Waknaghat, India.

Ward, B. T. and Sipior, J. C. (2010), The internet jurisdiction risk of cloud computing, Information Systems Management, 27, p.p. 334-9.

S. William. Network Security Essentials. Pearson Education India, 2008.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.