Cloud Computing: Security and Applications

Awantika*, Neha Rawat**, Poonam Rawat***, Shikha singh****
*-**** Govind Battabh Pant University of Agriculture and Technology, Patnagar, Uttarakhand.
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jcc.1.2.3045

Abstract

Cloud computing is becoming a fundamental part of Information Technology. Resource sharing is a pure plug and play model that effectively simplifies infrastructure planning. This is the aim of cloud computing. The two key advantages of this model are ease- of-use and cost-effectiveness. This paper explores some of the basics of cloud computing along with its security and application concerns. The paper also aims to provide the means for understanding the model and exploring options available for complementing your technology and infrastructure needs.

Keywords

Keywords: Applications, Attack, Cloud Computing, Denial-of-Service, Man in Middle Attack, Risk, Security.

How to Cite this Article?

Awantika, Rawat, N., Rawat, P., and Singh, S., (2014). Cloud Computing: Security and Applications. i-manager’s Journal on Cloud Computing, 1(2), 1-6. https://doi.org/10.26634/jcc.1.2.3045

References

[1]. J.Staten, et al., (2008). "Is Cloud Computing Ready for Enterprise?" Published in Forrester Research, March 7,2008.
[2]. Parks R., Harvey J. (2008). “Cloud Computing: What to Ask When the Clouds Roll In”, Presentation to the ACC Information Technology & Ecommerce Committee June 5, 2008.
[3]. P. Mell and T. Grance (2011), “The NIST definition of cloud computing”, NIST special publication, Vol. 800, No. 145.
[4]. S. Roschke, et aI., (2007). “Intrusion Detection in the Cloud ”, 8 IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China.
[5]. A. Singh and M. Shrivastava, (2012).“Overview of attacks on cloud computing,” International Journal of Engineering and Innovative Technology (IJEIT), Vol. 1, No. 4, pp.321-323.
[6]. http://www.mbaskool.com/business -articles/operations/5005-cloud-computing-a-betterwayto-do-it-.html CLOUD CCOMPUTING- A BETTER WAY TO DO IT. April 24th, 2014.
[7]. http://www.dman.com/cloud-computing-multi- tenancy- and - application-security.html. Cloud Computing Security. April 20th ,2014.
[8]. Farzad Sabahi, (2011). “Cloud computing security threats and responses”, IEEE, pp.245-249.
[9]. Jeff Beckham, (2011). “The Top 5 Security Risks of Cloud Computing”, CISCO BLOG, May 3.
[10]. http://resources.idgenterprise.com/original/AST- 0036145_G2A_demystifying_cloud_security.pdf. ForSecurity & Risk Professionals. April 20th, 2014.
[11]. http://www.networkworld.com/news/2008/070208-cloud.html. Gartner: Seven cloud computing security risks. April 24th, 2014.
[12]. Krutz, Ronald L., and Russell Dean Vines (2010). "Cloud Computing Security Architecture." Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis, IN: Wiley, pp. 179-80. Print.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.