Literature Review: Cloud Computing–Security Issues, Technologies and Challenges

Journal Title: Engineering and Scientific International Journal - Year 2016, Vol 3, Issue 2

Abstract

Cloud computing is drastically increasing so to make cloud computing more popular the very first step for the organization is to identify exact place where the cloud related threats lie. The changes from server to service based technology brought a increasing change in computing technology. The developments have created new security vulnerabilities, including security problems whose full impressions are still rising. This paper presents an overview and study of cloud computing, with several security threats, security problem, currently used cloud technologies.[1],[4]

Authors and Affiliations

Jothipriya D

Keywords

Related Articles

Physico-chemical parameters of Turori Dam, Turori, Dist., Osmanabad, During the Period Feb 2009 to Jan 2010

During the present study period the water samples collected from the Turori dam with the interval of one month from the selected spots of dam during the period of one year i.e. from Feb 2009 to Jan 2010. The parameters a...

Data Mining Clustering Techniques

— Data mining is a powerful technology to extract information from the large amount of the data. Data mining is considered as one of the important field in knowledge management. Today, Data mining helps different organiz...

Management of Secure IDS for Mobile Ad-Hoc Network

— In the modern world, mobile ad-hoc networks are consider as very popular research area. MANET is one of the important and unique applications in this field. The mobility and scalability brings by wireless networks are...

Security and Efficiency during Data Transmission in Wireless Sensor Networks

Nowadays wireless sensor networks are mostly used for environmental control, surveillance tasks, monitoring, tracking and controlling etc. For this, the wireless sensor network has to be safe and efficient. Clustering is...

Quasi-stationary thermo elastic problem with moving heat source in unidirectional Robin’s rod

In this paper we deal quasi-stationary, nonhomogeneous thermo elastic problem with Robin’s boundary condition in one dimensional rod of isotropic material occupying the region 0   x a . Initial temperature of the rod i...

Download PDF file
  • EP ID EP631427
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

Jothipriya D (2016). Literature Review: Cloud Computing–Security Issues, Technologies and Challenges. Engineering and Scientific International Journal, 3(2), 19-21. https://europub.co.uk./articles/-A-631427