A Study on Virtue and Faults of Security in Cloud Computing

Authors

  • Singh NK Department of Computer Engineering, Babasaheb Bhimarao Ambedkar University, Lucknow
  • Singh Ak Department of Computer Engineering, B.V.P, Pune, India

Keywords:

indexing, private cloud, protected cloud, public cloud, service provider, client owner

Abstract

Cloud computing is a web technology computing which requires large scale processing and computing. For this extensive processing, it requires security and protection in cloud computing for shareable configurable resources for on-demand access. This paper describes about the cloud computing merits and demerits of existing security and protection models in cloud computing

References

A. K. Singh, “A Study on Merits and Demerits of SAN Protocols,” vol. 3, no. X, pp. 1–5, 2015.

X. Qiu, Y. Dai, Y. Xiang, L. Xing, and S. Member, “Reliability, Performance , and Power Consumption of a Cloud Service,” vol. 46, no. 3

Surabhi Shukla and Dharamjeet kumar, "Cloud’s Software- Security as a Service(S-SaaS) via Biometrics", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (119-124), Mar -2014

W. Li, Y. Yang, and D. Yuan, “Ensuring Cloud Data Reliability with Minimum Replication by Proactive Replica Checking,” IEEE Trans. Comput., vol. 65, no. 5

M. Kangas, S. Glisic, S. Member, Y. Fang, and P. Li, “Resource Harvesting in Cognitive Wireless Computing Networks With Mobile Clouds and Virtualized Distributed Data Centers : Performance Limits,” IEEE Trans. Cogn. Commun. Netw., vol. 1, no. 3

Richa Arya , "Triple Security of File System for Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (148-154), Mar -2014

G. Fan, H. Yu, S. Member, and L. Chen, “A Formal Aspect-Oriented Method for Modeling and Analyzing Adaptive Resource Scheduling in Cloud Computing,” vol. 13, no. 2, p.

Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013.

J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information Flow Control for Secure Cloud Computing,” IEEE Trans. Netw. Serv. Manag., vol. 11, no. 1,

M. Amoon, “Adaptive Framework for Reliable Cloud Computing Environment,” IEEE Access, vol. 3536, no. c

K. Goyal, “International Journal of Advanced Research in Computer Science and Software Engineering Review of Different Energy Saving Techniques in Cloud Computing,” vol. 3, no. 7, pp. 1038–1042, 2013.

A. Sharma, S. Gupta, D. Mann, and S. Akhtar, “A Combined Model to Ensure Complete Security and Reliability in Cloud Computing,” vol. I, pp. 21–24, 2015.

Downloads

Published

2025-11-11

How to Cite

[1]
N. K. Singh and A. K. Singh, “A Study on Virtue and Faults of Security in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 5, no. 1, pp. 93–94, Nov. 2025.