JCC_V1_N2_A1
Cloud Computing: Security and Applications
Awantika
Neha Rawat
Poonam Rawat
Shikha Singh
Journal on Cloud Computing
2350-1308
1
2
1
6
Applications, Attack, Cloud Computing, Denial-of-Service, Man in Middle Attack, Risk, Security
Cloud computing is becoming a fundamental part of Information Technology. Resource sharing is a pure plug and play model that effectively simplifies infrastructure planning. This is the aim of cloud computing. The two key advantages of this model are ease- of-use and cost-effectiveness. This paper explores some of the basics of cloud computing along with its security and application concerns. The paper also aims to provide the means for understanding the model and exploring options available for complementing your technology and infrastructure needs.
February - April 2014
Copyright © 2014 i-manager publications. All rights reserved.
i-manager Publications
http://www.imanagerpublications.com/Article.aspx?ArticleId=3045