A Study on Virtue and Faults of Security in Cloud Computing
Keywords:
indexing, private cloud, protected cloud, public cloud, service provider, client ownerAbstract
Cloud computing is a web technology computing which requires large scale processing and computing. For this extensive processing, it requires security and protection in cloud computing for shareable configurable resources for on-demand access. This paper describes about the cloud computing merits and demerits of existing security and protection models in cloud computing
References
A. K. Singh, “A Study on Merits and Demerits of SAN Protocols,” vol. 3, no. X, pp. 1–5, 2015.
X. Qiu, Y. Dai, Y. Xiang, L. Xing, and S. Member, “Reliability, Performance , and Power Consumption of a Cloud Service,” vol. 46, no. 3
Surabhi Shukla and Dharamjeet kumar, "Cloud’s Software- Security as a Service(S-SaaS) via Biometrics", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (119-124), Mar -2014
W. Li, Y. Yang, and D. Yuan, “Ensuring Cloud Data Reliability with Minimum Replication by Proactive Replica Checking,” IEEE Trans. Comput., vol. 65, no. 5
M. Kangas, S. Glisic, S. Member, Y. Fang, and P. Li, “Resource Harvesting in Cognitive Wireless Computing Networks With Mobile Clouds and Virtualized Distributed Data Centers : Performance Limits,” IEEE Trans. Cogn. Commun. Netw., vol. 1, no. 3
Richa Arya , "Triple Security of File System for Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (148-154), Mar -2014
G. Fan, H. Yu, S. Member, and L. Chen, “A Formal Aspect-Oriented Method for Modeling and Analyzing Adaptive Resource Scheduling in Cloud Computing,” vol. 13, no. 2, p.
Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013.
J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, “Information Flow Control for Secure Cloud Computing,” IEEE Trans. Netw. Serv. Manag., vol. 11, no. 1,
M. Amoon, “Adaptive Framework for Reliable Cloud Computing Environment,” IEEE Access, vol. 3536, no. c
K. Goyal, “International Journal of Advanced Research in Computer Science and Software Engineering Review of Different Energy Saving Techniques in Cloud Computing,” vol. 3, no. 7, pp. 1038–1042, 2013.
A. Sharma, S. Gupta, D. Mann, and S. Akhtar, “A Combined Model to Ensure Complete Security and Reliability in Cloud Computing,” vol. I, pp. 21–24, 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
