Abstract

Cloud Computing (CC) is accomplished on the top of Gartner's list of the ten most disruptive technologies of the next years. It has been measured as a significant step towards achieving the long-held dream of envisioning computing as a utility. It provides a great chance to supply storage, processing, and visualization resources for sensing-based healthcare data also. Flexibility, scalability, computing and application resources, optimal utilization of infrastructure and reduced costs are the major cloud-based services. CC comes with abundant possibilities and challenges concurrently of which security / threats is most well-thought out vital barrier for cloud computing path to success. When putting and transmitting data using public networks exposed to the world, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model along with cloud deployment model in the cloud environment. This paper covers the roadmap on this machinery in detail so that “robust security application models” can be created / deployed easily with possible uncovered breaches.

Keywords
Cloud Computing, Disruptive Technology, Data Breach, Service Delivery Model, Visualization

Purchase Instant Access

PDF
10
USD

250
INR

HTML
10
USD

250
INR

Username / Email
Password
Don't have an account?  Sign Up
  • If you would like institutional access to this content, please recommend the title to your librarian.
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.

We strive to bring you the best. Your feedback is of great value to us. Feel free to post your comments and suggestions.