A Critique of Cloud Computing and its Security
Abstract
Cloud computing is an on-demand service model for
IT provision, often based on virtualization and distributed computing technologies. Cloud computing is a new way of delivering computing resources, not a new technology. It provides access to potentially Compos able & Interchangeable Services. There is a growing trend of using cloud environments for ever growing storage and data processing needs. Cloud computing introduces significant concerns
about privacy, security, data integrity, intellectual property management, audit trails, and other issues. Adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. While using various cloud services, there are so many complications related to security of cloud. There should be a trust between cloud provider and consumer accessing services. Hence it is needed to know its basic layered services, its various security standards and mechanisms to provide security for cloud computing. This paper focuses on various hardware and
software components of cloud and its various security mechanisms.
Keywords
Full Text:
PDFReferences
Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma,
“Towards Analyzing Data Security Risks in Cloud Computing
Environments”
Anthony Bisong and Syed (Shawon) M. Rahman,” An Overview Of
The Security Concerns In Enterprise Cloud Computing”, International
Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1,
January 2011.
Bo Peng, Bin Cui and Xiaoming Li, “Implementation Issues of A
Cloud Computing Platform”
Herminder Singh & Babul Bansal, “Analysis Of Security Issues And
Performance Enhancement In Cloud Computing”, International Journal
of Information Technology and Knowledge Management, July-
December 2010, Volume 2, No. 2, pp. 345-349
Marinela Mircea and Anca Ioana Andreescu, “Using Cloud
Computing in Higher Education: A Strategy to Improve Agility in the
Current Financial Crisis”
Mr. Kailash Patidar ,Mr. Ravindra Gupta et. Al. “Integrating the
Trusted Computing Platform into the Security of Cloud Computing
System”, International Journal of Advanced Research in Computer
Science and Software Engineering Volume 2, Issue 2, February 2012
ISSN: 2277 128X .
Richard Chow, Philippe Golle et. Al. “Controlling Data in the Cloud:
Outsourcing Computation without Outsourcing Control”
Samir Tout, “Cloud Computing and its Security in Higher Education”
Trusted Computing Group, ”Cloud Computing and Security – A
Natural Match”
Wayne A. Jansen, “Cloud Hooks: Security and Privacy Issues in
Cloud Computing”, NIST Proceedings of the 44th Hawaii International
Conference on System Sciences – 2011
Yu-Chao Liu; Yu-Tao Ma et. Al “A Method for Trust Management in
Cloud Computing: Data Coloring by Cloud Watermarking”,
International Journal of Automation and Computing 8(3), August
, 280-285 DOI: 10.1007/s11633-011-0583-3
Zhidong Shen, “The Security of Cloud Computing System Enabled
by Trusted Computing Technology”, 2010 2nd International
Conference on Signal Processing Systems
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.