Call For Paper

Volume 10 Issue 5

May 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

SANCTUARY THREATS AND SAFETY MENSURATION ON CLOUD COMPUTING

Author(s):

Shruthi B M

Keywords:

Identity and Access Management (IAM), Software-as-a Service (SaaS), Transparent Cloud Protection System (TCPS), Infrastructure-as-a-Service (IaaS).

Abstract

Cloud computing may be defined as management and provision of resources, software, applications and information as services over the cloud (internet) on demand. Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. With its ability to provide users dynamically scalable, shared resources over the Internet and avoid large upfront fixed costs, cloud computing has recently emerged as a promising hosting platform that performs an intelligent usage of a collection of services, applications, information and infrastructure comprised of pools of computer, network, information and storage resources. However along with these advantages, storing a large amount of data including critical information on the cloud motivates highly skilled hackers thus creating a need for the security to be considered as one of the top issues while considering Cloud Computing. In this paper we explain the cloud computing along with its open secure architecture advantages in brief and emphasize on various security threats in cloud computing also the existing methods to control them along with their pros and cons.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 11
Publication Date: 11/4/2016

Article Preview




Download Article