Survey on Security in Cloud Hosted Service & Self Hosted Services
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 5
Abstract
As more and more organizations consider moving their applications and data from dedicated hosting infrastructure, which they own and operate, to shared infrastructure leased from `the cloud', security remains a key sticking point. Tenants of cloud hosting providers have substantially less control over the construction, operation, and auditing of infrastructure they lease than infrastructure they own. Because cloud-hosted infrastructure is shared, attackers can exploit the proximity that comes from becoming a tenant of the same cloud hosting provider. As a result, some have argued that that cloud-hosted infrastructure is inherently less secure than the self-hosted infrastructure, and that it will never be appropriate for high-stakes applications such as health care or financial transaction processing. We strive to present a more balanced treatment of the potential security impacts of transitioning to cloud-hosted infrastructure, surveying both the security costs and security benefits of doing so. The costs include exposure to new threats, some of which are technological, but many others of which are contractual, jurisdictional, and organizational. We also survey potential countermeasures to address these threats, which are also as likely to be contractual or procedural as technological. Transitioning to a cloud-hosted infrastructure may also have security benefits; some security measures have high up-front costs, may become affordable when amortized at cloud scale, and impact threats common to both cloud- and self-hosted infrastructures. Surbhi Khare | Dr. Uday Kumar"Survey on Security in Cloud Hosted Service & Self Hosted Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15941.pdf http://www.ijtsrd.com/computer-science/computer-network/15941/survey-on-security-in-cloud-hosted-service-and-self-hosted-services/surbhi-khare
Hand Gesture Recognition using OpenCV and Python
Hand gesture recognition system has developed excessively in the recent years, reason being its ability to cooperate with machine successfully. Gestures are considered as the most natural way for communication among huma...
Approach Towards Analysis of Biopsy Slide of Breast Cancer
Pathologists placed tissue slices on glass slides use appropriate stains and examine them through a microscope. The proposed method uses insignificant portions of the slide images by colour polarization as a pre-processi...
Standardization and Optimization of Initiation, Shooting and Rooting Medium for Patchouli Micro Propagation
The media and hormone composition has been standardization and optimization from petiolate explants of Pogostemon Cablin Benth. a medicinally important plant species belonging to the family Lamiaceae. Axillary shoot bud...
Age Invariant Face Recognition
Face recognition across age progression is remains one of the areas most challenging tasks now a days, as the aging process affects both the shape and texture of a face. One possible solution is to apply a probabilistic...
Evolution of Remote Sensing and Graphical Information System Using CPU-GPU Platform
The Earths land use, land cover, land forms, spatial and geographical characteristics are crucial variables in global change. The impact of human activities on the earth has resulted greatly to climate change calls for a...