To see the other types of publications on this topic, follow the link: Cloud Computing ; Cloud Security ; Cloud.

Journal articles on the topic 'Cloud Computing ; Cloud Security ; Cloud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud Computing ; Cloud Security ; Cloud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.

Full text
Abstract:
Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters cl
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.

Full text
Abstract:
Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..
APA, Harvard, Vancouver, ISO, and other styles
3

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.

Full text
Abstract:
The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and qui
APA, Harvard, Vancouver, ISO, and other styles
5

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.

Full text
Abstract:
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved i
APA, Harvard, Vancouver, ISO, and other styles
7

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in mul
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.

Full text
Abstract:
Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.
APA, Harvard, Vancouver, ISO, and other styles
9

Shyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

D, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Charles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Zhu, You Chan, Peng Liu, and Jun Ting Wang. "Cloud Security Research in Cloud Computing." Applied Mechanics and Materials 198-199 (September 2012): 415–19. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sheela Gowr, P., and N. Kumar. "Cloud computing security: a survey." International Journal of Engineering & Technology 7, no. 2.21 (2018): 355. http://dx.doi.org/10.14419/ijet.v7i2.21.12439.

Full text
Abstract:
Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with
APA, Harvard, Vancouver, ISO, and other styles
16

Arshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.

Full text
Abstract:
The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations
APA, Harvard, Vancouver, ISO, and other styles
17

SHORO, S., S. RAJPER, and B. BALOCH. "Cloud Computing Security." SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES 49, no. 004 (2017): 831——834. http://dx.doi.org/10.26692/surj/2017.12.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Carlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.

Full text
Abstract:
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently present within the cloud computing industry.
APA, Harvard, Vancouver, ISO, and other styles
19

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Full text
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficie
APA, Harvard, Vancouver, ISO, and other styles
20

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Full text
Abstract:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using waterm
APA, Harvard, Vancouver, ISO, and other styles
21

Arun, Lakshna, and T. N. Ravi. "Mobile Cloud Computing: A Literature Survey." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 80–85. http://dx.doi.org/10.51983/ajeat-2018.7.2.1003.

Full text
Abstract:
Mobile cloud computing (MCC) is the availability of cloud computing services in a mobile environment. By providing optimal services for mobile users, MCC incorporates the elements of mobile networks and cloud computing. In mobile cloud computing, all the data and complicated computing modules can be processed in clouds, and mobile devices do not need a powerful configuration like CPU speed, memory capacity, etc. However, the mobile devices are facing up with many struggles in their resources (e.g., battery life, storage, and bandwidth) and communications (e.g., privacy, mobility, and security)
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Tian, Yucheng Lu, Zhihan Cao, et al. "When Sensor-Cloud Meets Mobile Edge Computing." Sensors 19, no. 23 (2019): 5324. http://dx.doi.org/10.3390/s19235324.

Full text
Abstract:
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. The emergence of sensor-clouds has greatly enhanced the computing power and storage capacity of traditional WSNs via exploiting the advantages of cloud computing in resource utilization. However, there are still many problems to be solved in sensor-clouds, such as the limitations of WSNs in terms of communication and energy, the high latency, and the security and privacy issues due to applying a cloud platform as the data processing and control center. In recent years, mobile edge computing has received inc
APA, Harvard, Vancouver, ISO, and other styles
23

Yupeng, Tuo, Xu Jie, Xu Zhikai, and Ye Jianwei. "Job Security in the Cloud Computing." International Journal of Future Computer and Communication 4, no. 1 (2015): 59–62. http://dx.doi.org/10.7763/ijfcc.2015.v4.356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Anjaneyulu, P., and Mr S. Srinivasa Reddy. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 390–93. http://dx.doi.org/10.31142/ijtsrd12995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Li Hui. "Research on Security of Database in Cloud Computing Environment." Applied Mechanics and Materials 644-650 (September 2014): 1694–97. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1694.

Full text
Abstract:
Cloud computing is one of the newest popular technologies in the era of big data, and the problem of database security under the circumstance cloudy computing is one of the key problems of restricting the development and application of cloudy computing. This paper introduces the concept and features of cloudy computing firstly, and then the defect of cloudy database is analyzed, in the end we put forward to several security policies to solve those current problems.
APA, Harvard, Vancouver, ISO, and other styles
26

Arshad, Junaid, Paul Townend, and Jie Xu. "An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds." International Journal of Cloud Applications and Computing 1, no. 1 (2011): 1–16. http://dx.doi.org/10.4018/ijcac.2011010101.

Full text
Abstract:
Cloud computing is an emerging computing paradigm which introduces novel opportunities to establish large scale, flexible computing infrastructures. However, security underpins extensive adoption of Cloud computing. This paper presents efforts to address one of the significant issues with respect to security of Clouds i.e. intrusion detection and severity analysis. An abstract model for integrated intrusion detection and severity analysis for Clouds is proposed to facilitate minimal intrusion response time while preserving the overall security of the Cloud infrastructures. In order to assess t
APA, Harvard, Vancouver, ISO, and other styles
27

Motawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.

Full text
Abstract:
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work,
APA, Harvard, Vancouver, ISO, and other styles
28

Фролов, Вячеслав Вікторович. "АНАЛИЗ ПОДХОДОВ К ОБЕСПЕЧЕНИЮ БЕЗОПАСНОСТИ ОБЛАЧНЫХ СЕРВИСОВ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 1 (28 січня 2020): 70–82. http://dx.doi.org/10.32620/reks.2020.1.07.

Full text
Abstract:
The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, wh
APA, Harvard, Vancouver, ISO, and other styles
29

Jain, Jaishree, and Ajit Singh. "Quantum-based Rivest–Shamir–Adleman (RSA) approach for digital forensic reports." Modern Physics Letters B 34, no. 06 (2020): 2050085. http://dx.doi.org/10.1142/s0217984920500852.

Full text
Abstract:
Cloud computing is a model that permits usage of a distributed resource for cloud users using the pay-as-you-use method. It offers many advantages to users and companies, in terms of various resources and applications as a service. In spite of the existence of these advantages, there are a few limitations that place constraints on the utilization of a cloud computing environment. Security is an important concern in a cloud computing environment as it probes various security attacks. Therefore, in this work, a novel quantum-based Rivest–Shamir–Adleman (RSA) model is proposed for encryption of f
APA, Harvard, Vancouver, ISO, and other styles
30

Mahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.

Full text
Abstract:
Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users’ hands. Cloud Computing represents a new computing model that poses many demandi
APA, Harvard, Vancouver, ISO, and other styles
31

RoyChowdhury, Rajarshi. "Security in Cloud Computing." International Journal of Computer Applications 96, no. 15 (2014): 24–30. http://dx.doi.org/10.5120/16870-6767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Alrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Vorobiev, V,, S. R, Ryzhkov, and R. R. Fatkieva. "Cloud computing security perimeter." Program Systems: Theory and Applications 6, no. 1 (2015): 61–71. http://dx.doi.org/10.25209/2079-3316-2015-6-1-61-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Singh, Shweta. "Security in Cloud Computing." International Journal of Computer Applications Technology and Research 3, no. 8 (2014): 488–93. http://dx.doi.org/10.7753/ijcatr0308.1001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.

Full text
Abstract:
Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for
APA, Harvard, Vancouver, ISO, and other styles
36

Ahmed, Monjur, and Mohammad Ashraf Hossain. "Cloud Computing and Security Issues in the Cloud." International Journal of Network Security & Its Applications 6, no. 1 (2014): 25–36. http://dx.doi.org/10.5121/ijnsa.2014.6103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yunis, Manal M. "A 'cloud-free' security model for cloud computing." International Journal of Services and Standards 5, no. 4 (2009): 354. http://dx.doi.org/10.1504/ijss.2009.032177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Changchit, Chuleeporn. "Cloud Computing." International Journal of Information and Communication Technology Education 11, no. 2 (2015): 105–17. http://dx.doi.org/10.4018/ijicte.2015040109.

Full text
Abstract:
Cloud computing has become increasingly popular among users and businesses around the world, and education is no exception. Cloud computing can bring an increased number of benefits to an educational setting, not only for its cost effectiveness, but also for the thirst for technology that college students have today, which allows learning and adopting to these new technologies easier for them. This study aims at investigating how cloud computing is perceived by college students and which factors have a tendency to encourage or discourage them to accept the cloud computing as part of their cour
APA, Harvard, Vancouver, ISO, and other styles
39

Govinda, K., and E. Sathiyamoorthy. "Privacy Preservation of a Group and Secure Data Storage in Cloud Environment." Cybernetics and Information Technologies 15, no. 1 (2015): 46–54. http://dx.doi.org/10.1515/cait-2015-0005.

Full text
Abstract:
Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Nawsher, A. Noraziah, Elrasheed I. Ismail, Mustafa Mat Deris, and Tutut Herawan. "Cloud Computing." International Journal of E-Entrepreneurship and Innovation 3, no. 2 (2012): 51–59. http://dx.doi.org/10.4018/jeei.2012040104.

Full text
Abstract:
Cloud computing is fundamentally altering the expectations for how and when computing, storage, and networking resources should be allocated, managed, consumed, and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for current fast growing business world. A client, organization or a trade that adopting emerging cloud environment can choose a well suitable infrastructure, platform, software,
APA, Harvard, Vancouver, ISO, and other styles
41

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Malviya, Deepak Kumar, and Umesh Kumar Lilhore. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lakshmi, V. Naga, and Shameena Begum. "Security Issues & Controls in Cloud Computing." Indian Journal of Applied Research 1, no. 5 (2011): 38–40. http://dx.doi.org/10.15373/2249555x/feb2012/15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Aiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

B.Arun, B. Arun, and S. K. Prashanth S.K.Prashanth. "Cloud Computing Security Using Secret Sharing Algorithm." Paripex - Indian Journal Of Research 2, no. 3 (2012): 93–94. http://dx.doi.org/10.15373/22501991/mar2013/35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Santiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.

Full text
Abstract:
ABSTRAK Cloud Computing atau komputasi awan adalah gabungan pemanfaatan teknologi komputer ('komputasi') dan pengembangan berbasis Internet ('awan'). Awan (cloud) adalah metafora dari internet, sebagaimana awan yang sering digambarkan pada diagram jaringan computer. Selain seperti awan dalam diagram jaringan komputer, awan (cloud) dalam cloud computing juga merupakan abstraksi dari infrastuktur kompleks yang disembunyikannya. Private Cloud Storage dengan kolaborasi komponen Service Oriented Architecture mampu menyediakan antarmuka yang efisien untuk proses berjalannya lembaga dan berfungsi seb
APA, Harvard, Vancouver, ISO, and other styles
47

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Full text
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud
APA, Harvard, Vancouver, ISO, and other styles
48

R, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.

Full text
Abstract:
The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at
APA, Harvard, Vancouver, ISO, and other styles
49

Rasina Begum, B., and P. Chithra. "Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 13–17. http://dx.doi.org/10.51983/ajeat-2020.9.1.1084.

Full text
Abstract:
Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security t
APA, Harvard, Vancouver, ISO, and other styles
50

Bhardwaj, Akashdeep, and Sam Goundar. "Unique Taxonomy for Evaluating Fog Computing Services." International Journal of E-Business Research 14, no. 4 (2018): 78–90. http://dx.doi.org/10.4018/ijebr.2018100105.

Full text
Abstract:
Cloud computing has slowly but surely become the foremost service provider for information technology applications and platform delivery. However, Cloud issues continue to exist, like cyberattacks, slow last mile latency, and clouds lack client-centric and location-aware applications to process real time data for efficient and customized application delivery. As an alternative, Fog Computing has the potential to resolve these issues by extending the Cloud service provider's reach to the edge of the Cloud network model, right up to the Cloud service consumer. This enables a whole new state of a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!