Survey of Security Issues in Cloud Computing
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 4
Abstract
The growth in field of cloud computing increases threat security aspects. In fact security has remained a constant issue for internet and networking, and cloud computing is effected. Cloud computing is surrounded by many security issues so in this paper I will study quickly some research papers for cloud security and will present my opinion about this risks and give some possible and easy countermeasures.
Authors and Affiliations
Helidon Karcanaj| University of Tirana, Informatics mathematics and Statistic Department, Elvira Mjeshtri| Computer Engineering, Faculty of Information Technology, Polytechnic University of Tirana, Igli Tafa| Computer Engineering, Faculty of Information Technology, Polytechnic University of Tirana
ISSUES ON WIRELESS NETWORK SECURITY
Wireless technologies unleash US from Mattel copper wires. A user will have a personal computer, Laptop, Tablet PC, or a cellular phone and keep on-line anyplace a wireless signals square measure on the market. the fu...
Multi-Band Rectangular Microstrip Patch Antenna with Defected Ground Structure and a Metallic Strip
Microstrip antennas and arrays are small in size any easy to manufacture. The proposed antenna is operated in the S-band and X-band with three resonant frequencies. The antenna has two resonance in the X-band used in...
Essential Requirements of PPAP
In today’s competitive environment industries are using various quality standards, such as ISO, TS, APQP etc. While applying these standards in any organizations there are certain procedures. Extensive technical do...
Estimation of Basic Reproduction Number R0 for SEIR Dengue Fever Model
In this paper, we mainly focus on the transmission of dengue fever with the aim of analyzing and comparing logistic and exponential curve that occurred in Lahore (Pakistan), in the year 2010–-2011. We obtain the fo...
Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security...