SlideShare a Scribd company logo
1 of 6
Download to read offline
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 5|P a g e
TThhee RRiisskk aanndd CChhaalllleennggeess ooff CClloouudd CCoommppuuttiinngg
Usman Namadi Inuwa
M.Sc. Computer Science Department of Computer Science Jodhpur National University, Jodhpur Rajasthan,
India
Abstract
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Index Terms: Cloud Computing, Review, Security challenges, Threats.
I. INTRODUCTION
Computers have become absolutely necessary
part of our life today. We need computers
everywhere, be it for work, research or in any field.
The computing resources we are using increases as
the use of computer in our daily activities increase
tremendously. For companies like Google and
Microsoft, managing the resources when they need it
is not a problem. But when it comes to smaller
enterprises, affordability becomes a huge factor[25].
With the huge infrastructure come problems like
machines failure, hard drive crashes, software bugs,
etc. This might be a big headache for such a
community. Cloud Computing offers a solution to this
situation.
Cloud computing helps in minimizing an
organization‟s expenditure towards managing
resources and also reduces the burden of maintaining
software or hardware by its user. Cloud computing is
an Internet-based computing technology, where
shared resources such as software, platform, storage
and information are provided to customers on
demand. Cloud Computing is a computing platform
for sharing resources that include infrastructures,
software, applications, and business processes. Cloud
Computing is a virtual pool of computing resources.
It provides computing resources in the pool for users
through internet.
We are in the era in which information protection
is the goal of every organisation. The rapid growth o f
cloud computing has brought many security
challenges for users and providers. And the risk of
attacking both personal and organisational data store
in cloud storage by an attacker is high as such
computer expert are using many techniques for
protecting users‟ data from unautherized party. This
paper explore some of the approach use in protecting
the confidentiality of users‟ data from service
providers, and ensures service providers cannot
collect users‟ confidential data while the data is
processed and stored in cloud computing systems.
To Understand the security issues of cloud
computing which affect the confidentiality and
vulunerability of this kind of system, this paper give a
brief history of cloud computing and explore the
deployment models and the service delivery models
to identify the threat
1.2 BRIEF HISTORY AND DEFINITION
Cloud Computing (CC) is a new term given to a
technological evolution of distributed computing and
grid computing[10].
The idea of computing in a "cloud" traces back
to the origins of utility computing, a concept that
computer scientist John McCarthy publicly proposed
in 1961[3].
The general public has been leveraging forms of
Internet-based computer utilities since the mid 1990s
through various incarnations of search engines
(Yahoo!, Google), e-mail services (Hotmail, Gmail),
open publishing platforms (MySpace, Facebook,
YouTube), and other types of social media (Twitter,
LinkedIn)[3]. Without the development of
ARPANET (Advance Research Projects Agency
Network) by J.C.R.Licklider in 1960‟s and many
other researchers who dream of improving the
interconnection of systems, CC would never have
come into existence[10].
A Gartner report listing cloud computing at the
top of its strategic technology areas further reaffirmed
its prominence as an industry trend by announcing its
formal definition as[3]:
RESEARCH ARTICLE OPEN ACCESS
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 6|P a g e
"...a style of computing in which scalable and elastic
IT-enabled capabilities are delivered as a service to
external customers using Internet technologies."
Forrester Research provided its own definition of
cloud computing as[3]:
"...a standardized IT capability (services, software,
or infrastructure) delivered via Internet technologies
in a pay-per-use, self-service way."
The definition that received industry-wide
acceptance was composed by the National Institute of
Standards and Technology (NIST)[3]. NIST
published its original definition back in 2009,
followed by a revised version after further review and
industry input that was published in September of
2011[10]:
"Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources
(e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and
released with minimal management effort or service
provider interaction”[26].
This cloud model is composed of five essential
characteristics, three service models, and four
deployment models[3].
1.3 BENEFIT OF CLOUD COMPUTING
Before, people use to run applications or
programs from software downloaded on a physical
computer or server in their building. Cloud
computing simplify this, cloud computing which is
based on Internet allows people to access the same
kind of application through the Internet[1].
But, why so many organization are moving to cloud?
The reason may be the following:-
(1) Flexibility: The aim of every business
organisation is to have more customers and
today's business are all online as customer
increase in accessing organisation application,
the amount of data that an application handles is
increasing day by day and so is the CPU power
that can harness. Organisation needs more
bandwidth a cloud-based service can instantly
meet the demand because of the vast capacity of
the service's of remote servers.
(2) Disaster Recovery: When an organisation start
relying on cloud-based services, they no longer
need complex disaster recovery plans. Cloud
computing providers take care of most issues,
and they do it faster. Aberdeen Group found that
businesses which used cloud were able to resolve
issues in an average of 2.1 hours nearly four
times faster than those not on cloud[1].
(3) Automatic Software Update: In 2010, Uk
companies spent 18 working days per month
managing on-site security alone[1]. But today
with cloud computing the providers do the server
maintenance including security update within a
short time, freeing up their customers' time and
resources for other task.
(4) Work From Anywhere: As long as there is
internet access customers' and organisation
employee can access there information anywhere.
In addition, since document are stored dirctly
onto the cloud, anyone with authorized access
can access the documents and work on the same
project at the same time. Avoiding time lost and
documents with several untrackable versions.
(5) Better for the Environment: Many small to
corporate size companies require the use of mor
servers to get jobs don because server utiliation
rates are about 5-10%, whereas cloud utilization
raates are int the 70% range, this is because
cloud computing eliminates in-house servers,
there is no need for the constant climate control
involved in maintaing servers and elimanate
carbon footprints.
(6) Security: Large number of laptops with vital
0information are report yearly stolen or loss.
This can have some serious monetary
implications, but when everything is stored in the
cloud, data can still be accessed no matter what
happens to a machine.
II. SECURITY ISSUES IN CLOUD
COMPUTING
Although there are many benefits to adopting
Cloud Computing, there are also some significant
barriers to adoption [6]. Because Cloud Computing
represents a relatively new computing model, there is
a great deal of uncertainty about how security at all
levels (e.g., network, host, application, and data
levels) can be achieved and how applications security
is moved to Cloud Computing [7]. That uncertainty
has consistently led information executives to state
that security is their number one concern with Cloud
Computing [8].
2.1 SERVICE DELIVERY MODELS
2.1.1 Infrastructure as a Service (IaaS)
Infrastructure as a Service is a single tenant cloud
layer where the Cloud computing vendor‟s dedicated
resources are only shared with contracted clients at a
pay-per-use fee. The capability provided to the
consumer is to provision processing, storage,
networks, and other fundamental computing resources
where the consumer is able to deploy and run
arbitrary software, which can include operating
systems and applications[4].
IaaS only provides basic security (perimeter
firewall, load balancing, etc.) and applications
moving into the cloud will need higher levels of
security provided at the host.
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 7|P a g e
2.1.2. Platform as a Service (PaaS)
Platform-as-a-Service (PaaS) is a set of software
and development tools hosted on the provider's
servers. It is one layer above IaaS on the stack and
offers an integrated set of developer environment that
a developer can tap to build applications without
having any clue about what is going on underneath
the service. It offers developers a service that
provides a complete software development life cycle
management, from planning to maintenance [1].
2.1.3 Software as a Service (SaaS)
Software-as-a-Service is a software distribution
model in which applications are hosted by a vendor
or service provider and made available to customers
over a network, typically the Internet.
The architecture of SaaS-based applications is
specifically designed to support many concurrent
users (multitenancy) at once. The capability provided
to the consumer is to use the provider‟s applications
running on a cloud infrastructure[4].
2.1.4 Anything as a Service (XaaS)
Anything as a Service (XaaS): This is more
general form of representing deployment of a service.
These services could be of any type and „X‟ in XaaS
can be substituted by software, hardware,
infrastructure, data, business, IT, Security,
monitoring, etc. These days new service models are
being developed. Examples are: IT as a service,
Cloud as a Service (CaaS), Management as a Service
(MaaS), Storage as a Service, Hardware as a Service
(HaaS), Identity as a Service, Privacy and
Anonymization as a Service etc., are some other
services that are identified in literature[10].
2.2 CLOUD DEPLOYMENTS MODELS
The Cloud Computing model has four main
deployment models which are:
I. Public cloud: describes cloud computing in the
traditional mainstream sense, whereby resources
are dynamically provisioned on a fine-grained,
self-service basis over the Internet, via web
applications/web services, from an off-site third-
party provider who shares resources and bills on
a fine-grained utility computing basis. Public
clouds are less secure than the other cloud
models because it places an additional burden of
ensuring all applications and data accessed on the
public cloud are not subjected to malicious
attacks.
II. Community cloud: is similar to a public cloud
except that its access is limited to a specific
community of cloud consumers. The community
cloud may be jointly owned by the community
members or by a third-party cloud provider that
provisions a public cloud with limited access[1].
Membership does not necessarily guarantee access to
or control of all the cloud's IT resources.
III. Private cloud:It is set up within an
organization‟s internal enterprise data center. In
the private cloud, scalable resources and virtual
applications provided by the cloud vendor are
pooled together and available for cloud users to
share and use. It differs from the public cloud in
that all the cloud resources and applications are
managed by the organization itself, similar to
Intranet functionality. Utilization on the private
cloud can be much more secure than that of the
public cloud because of its specified internal
exposure. Only the organization and designated
stakeholders may have access to operate on a
specific Private cloud.[12]
IV. Hybrid cloud: is a private cloud linked to one or
more external cloud services, centrally managed,
provisioned as a single unit, and circumscribed
by a secure network [14]. It provides virtual IT
solutions through a mix of both public and
private clouds. Hybrid Cloud provides more
secure control of the data and applications and
allows various parties to access information over
the Internet. It also has an open architecture that
allows interfaces with other management
systems.
2.3 RISK AND CHALLENGES
Several of the most critical cloud computing
challenges and the security risk pertaining mostly to
cloud consumers that use one of the services
described above located in clouds are examine
 Increased Security Vulnerabilities
The moving of private and organizational data to
the cloud guarantee access to share the data with the
cloud provider. The remote usage of the services
requires an expansion of trust boundaries by the cloud
consumer to include the external cloud. It can be
difficult to establish a security architecture that spans
such a trust boundary without introducing
vulnerabilities, unless cloud consumers and cloud
providers happen to support the same or compatible
security frameworks which is unlikely with public
clouds[3].There can be overlapping trust boundaries
from different consumers who share the same cloud
services and resources.
The overlapping of trust boundaries and the increased
exposure of data can provide malicious cloud
consumers (human and automated) with greater
opportunities to attack IT resources and steal or
damage business data[3].
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 8|P a g e
Figures- 1 The shaded area with diagonal lines
indicates the overlap of two organizations' trust
boundaries.
 Reduced Operational Governance Control
Cloud consumers are usually allotted a level of
governance control that is lower than that over on
premise IT resources. This reduced level of
governance control can introduce risks associated
with how the cloud provider operates its cloud, as
well as the external connections that are required for
communicate between the cloud and the cloud
consumer.
 Limited Portability Between Cloud Providers
Due to a lack of established industry standards
within the cloud computing industry, public clouds
are commonly proprietary to various extents. For
cloud consumers that have custom-built solutions
with dependencies on these proprietary environments,
it can be challenging to move from one cloud
provider to another[3].
Figure 2 - A cloud consumer's application has a
decreased level of portability when assessing a
potential migration from Cloud A to Cloud B,
because the cloud provider of Cloud B does not
support the same security technologies as Cloud A.
 Multi-Regional Regulatory and Legal Issues
Cloud providers establish there data centers in
affordable or convenient geographical locations.
There is transparancy of the physical location of their
resources and the data hosted in the clouds. For some
organizations, this can pose serious legal concerns
pertaining to industry or government regulations that
specify data privacy and storage policies. For
example, some UK laws require personal data
belonging to UK citizens to be kept within the United
Kingdom.
Some countries have laws that require some
types of data to be disclosed to certain government
agencies or to the subject of the data. For example, a
European cloud consumer's data that is located in the
U.S. can be more easily accessed by government
agencies (due to the U.S. Patriot Act) when compared
to data located in many European Union countries[3].
2.4 THREATS IN CLOUD
There are numerous security issues for cloud
computing as it encompasses many technologies
including networks, databases, operating systems,
virtualization, resource scheduling, transaction
management, load balancing, concurrency control and
memory management [12].
The threats to information assets residing in the
cloud can vary according to the cloud delivery
models used by cloud user organizations[17].
Cloud computing alliance did research in 2013
on cloud computing security threats and identified
these threats[14].
 Traffic Hijacking
 Insecure Interface and APIs.
 Denial of Service.
 Malicious Insiders.
 Abuse of Cloud Services.
 Insufficient Due Diligence.
 Shared Technology Vulnerabilities
 Data Breaches
 Unknown Risk Profile
 Perimeter Security Model Broken
2.5 PROPOSED SOLUTION
Cloud providers should address information
security and privacy risks associated with deploying
information into any cloud computing environment.
Below are some proposed solution to the issues
discuss
 Cloud providers should ensure that data in the
cloud environment is tamper proof, protected
through encryption at the kernel level.
Communication between the customer and the
provider's server is secure, thus avoiding the risk
of any man-in-the-middle attacks to gain access
to the encryption keys.
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 9|P a g e
 Cloud provider should use industry standard
AES encryption to make data unreadable and
unusable to those without the encryption key.
Rendering the data useless greatly reduces the
risks associated with data theft, exposure to
unauthorized parties or data seizure through
judicial subpoena.
 Providers should provide a unique policy-based
approach to key management and data access
which allows users to determine exactly which
server gets access to secure data.
III. CONCLUSION
As Individuals, government and non-
governmental organization, small and large scale
enterprises make plans to deploy their data and other
applications in private, community and public cloud
environments, new security challenges need to be
addressed. Optimal cloud security practices should
include encryption of sensitive data used by cloud-
based virtual machines; centralized key management
that allows the user (and not the cloud provider) to
control cloud data; and ensuring that cloud data is
accessible according to established enterprise
policies.
This paper discuss the benefit of using cloud
computing, the risk and challenges of this new
technology and the threat that are emerging which
attack the confidentiality and vulnerability of the
information in cloud. At the end proposed solution
for safeguarding information in both private, public,
community cloud services were cited.
REFERENCES
[1] Why Move to the cloud?
http://www.salesforce.com/uk/socialsucess/c
loud-computing/why-move-to-cloud-10-
benefits-cloud-computing.jsp 24/10/2015
15:03
[2] Ken E. Stavinoha “What is cloud computing
and why do we need it?”
http://isacahouston.org/documents/WhatisCl
oudComputingandWhyDoWeNeedIt.pdf
27/10/2015 00:09
[3] http://whatiscloud.com/cloud_deployment_
models/ 27/10/2015 2:01
[4] Keiko Hashizume, David G Rosado,
Eduardo Fernández-Medina and Eduardo B
Fernandez (2013), An analysis of security
issues for cloud computing, Journal of
Internet Services and Application
[5] Gartner Inc Gartner identifies the Top 10
strategic technologies for 2011. Online.
Available:
http://www.gartner.com/it/page.jsp?id=1454
221. Accessed: 15-Jul-2011
[6] KPMG (2010) From hype to future:
KPMG‟s 2010 Cloud Computing survey..
Available:
http://www.techrepublic.com/whitepapers/fr
om-hype-to-future-kpmgs-2010-cloud-
computing-survey/238429
[7] Rosado DG, Gómez R, Mellado D,
Fernández-Medina E (2012) Security
analysis in the migration to cloud
environments. Future Internet 4(2):469–487
[8] Mather T, Kumaraswamy S, Latif S (2009)
Cloud Security and Privacy. O‟Reilly Media,
Inc., Sebastopol, CA
[9] Rabi Prasad Padhy, Manas Ranjan Patra,
Suresh Chandra Satapathy (2011) Cloud
Computing: Security Issues and Research
Challenges, IRACST - International Journal
of Computer Science and Information
Technology & Security (IJCSITS) Vol. 1,
No. 2, December 2011
[10] Santosh Bulusu, Kalyan Sudia (2012), A
Study on Cloud Computing Security
Challenges, Masters Thesis: School of
Computing Blekinge Institute of Technology
SE-371 79 Karlskrona Sweden.
[11] Prince Jain (2012), Security Issues and their
Solution in Cloud Computing, International
Journal of Computing & Business Research -
ISSN (Online): 2229-6166
[12] Kevin Hamlen, Murat Kantarcioglu, Latifur
Khan, Bhavani Thuraisingham, Security
Issues for Cloud Computing, International
Journal of Information Security and Privacy,
4(2), 39-51, University of Texas, USA,
April-June 2010.
[13] Thomas Erl, Zaigham Mahmood, Ricardo
Puttini “Cloud Computing: Concepts,
Technology & Architecture
[14] Rajani Sharma, Rajender Kumar Trivedi
(2014) “Literature review: Cloud Computing
–Security Issues, Solution and
Technologies” International Journal of
Engineering Research Volu me No.3, Issue
No.4, pp : 221-225
[15] Mohammad Sajid,Zahid Raza (2013),
“Cloud Computing: Issues & Challenges”,
International Conference on Cloud, Big Data
and Trust 2013, Nov 13-15, RGPV
[16] Patrick Höner “Cloud Computing Security
Requirements and Solutions: a Systematic
Literature Review”
[17] Jaydip Sen, “Security and Privacy Issues in
Cloud C loud Computing”
[18] Monjur Ahmed, Mohammad Ashraf Hossain
“CLOUD COMPUTING AND S ECURITY
ISSUES IN THE CLOUD” International
Journal of Network Security & Its
Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10
www.ijera.com 10|P a g e
Applications (IJNSA), Vol.6, No.1, January
2014
[19] Sharma, Rajeev, and Bright Keswani.
"STUDY& ANALYSIS OF CLOUD
BASED ERP SERVICES."
[20] A. Kundu, C. D. Banerjee, P. Saha,
“Introducing New Services in Cloud
Computing Environment”, International
Journal of Digital Content Technology and
its Applications, AICIT, Vol. 4, No. 5, pp.
143-152, 2010.
[21] Lizhe Wang, Jie Tao, Kunze M., Castellanos
A.C., Kramer D., Karl W., “Scientific Cloud
Computing: Early Definition and
Experience,” 10th IEEE Int. Conference on
High Performance Computing and
Communications, pp. 825-830, Dalian,
China, Sep. 2008, ISBN: 978-0-7695-3352-
0.
[22] R. L Grossman, “The Case for Cloud
Computing,” IT Professional, vol. 11(2), pp.
23-27, 2009, SSN: 1520-9202.
[23] B. R. Kandukuri, R. Paturi V, A. Rakshit,
“Cloud Security Issues”, In Proceedings of
IEEE International Conference on Services
Computing, pp. 517-520, 2009.
[24] Meiko Jensen, Jorg Schwenk, Nils
Gruschka, Luigi Lo Iacon, “On technical
Security Issues in Cloud Computing,” Proc.
of IEEE International Conference on Cloud
Computing (CLOUD-II, 2009), pp. 109-116,
India, 2009.
[25] Maheswaran.M (2008) “CLOUD
COMPUTING”, seminar report, school of
engineering cochin university of science and
technology, cochin – 682022
[26] Patricia Yancey Martin and Barry A. Turner.
Grounded theory and organizational
research. The Journal of Applied Behavioral
Science, 22(2):141–157, April 1986.

More Related Content

What's hot

A220113
A220113A220113
A220113irjes
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud securityIJCSEA Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 

What's hot (20)

Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
A220113
A220113A220113
A220113
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud security
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
G033030035
G033030035G033030035
G033030035
 
Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161Kamal Jyoti V3I5-0161
Kamal Jyoti V3I5-0161
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
H046053944
H046053944H046053944
H046053944
 
70 74
70 7470 74
70 74
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 

Viewers also liked

Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberSolving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberIJERA Editor
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewIJERA Editor
 
Optimizing Hybrid Wind/Diesel Generator System Using BAT Algorithm
Optimizing Hybrid Wind/Diesel Generator System Using BAT AlgorithmOptimizing Hybrid Wind/Diesel Generator System Using BAT Algorithm
Optimizing Hybrid Wind/Diesel Generator System Using BAT AlgorithmIJERA Editor
 
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty SandEffect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty SandIJERA Editor
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesIJERA Editor
 
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical Review
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical ReviewEffect of Algal Bio-fertilizer on the Vigna radiata: A Critical Review
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical ReviewIJERA Editor
 
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEW
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEWReal-Time Monitoring of Industrial Environmental Temperature using LabVIEW
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEWIJERA Editor
 
Speed Control of Induction Motor Using PLC and SCADA System
Speed Control of Induction Motor Using PLC and SCADA SystemSpeed Control of Induction Motor Using PLC and SCADA System
Speed Control of Induction Motor Using PLC and SCADA SystemIJERA Editor
 
Review of Jobran Khalil Jobran's works from Romantic Features
Review of Jobran Khalil Jobran's works from Romantic FeaturesReview of Jobran Khalil Jobran's works from Romantic Features
Review of Jobran Khalil Jobran's works from Romantic FeaturesIJERA Editor
 
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...IJERA Editor
 
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...IJERA Editor
 
Removal of Unwanted Objects using Image Inpainting - a Technical Review
Removal of Unwanted Objects using Image Inpainting - a Technical ReviewRemoval of Unwanted Objects using Image Inpainting - a Technical Review
Removal of Unwanted Objects using Image Inpainting - a Technical ReviewIJERA Editor
 
A Modified Design of Test Pattern Generator for Built-In-Self- Test Applications
A Modified Design of Test Pattern Generator for Built-In-Self- Test ApplicationsA Modified Design of Test Pattern Generator for Built-In-Self- Test Applications
A Modified Design of Test Pattern Generator for Built-In-Self- Test ApplicationsIJERA Editor
 
Memory Polynomial Based Adaptive Digital Predistorter
Memory Polynomial Based Adaptive Digital PredistorterMemory Polynomial Based Adaptive Digital Predistorter
Memory Polynomial Based Adaptive Digital PredistorterIJERA Editor
 
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...IJERA Editor
 
A Critical View on Pedagogical Dimension of Architectural Education in India
A Critical View on Pedagogical Dimension of Architectural Education in IndiaA Critical View on Pedagogical Dimension of Architectural Education in India
A Critical View on Pedagogical Dimension of Architectural Education in IndiaIJERA Editor
 
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)IJERA Editor
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat KoçyiğitRIHLE Uzaktan Eğitim Merkezi
 
コストゼロで新卒採用のご提案
コストゼロで新卒採用のご提案コストゼロで新卒採用のご提案
コストゼロで新卒採用のご提案Spaceeinc
 

Viewers also liked (20)

Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberSolving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An Overview
 
Optimizing Hybrid Wind/Diesel Generator System Using BAT Algorithm
Optimizing Hybrid Wind/Diesel Generator System Using BAT AlgorithmOptimizing Hybrid Wind/Diesel Generator System Using BAT Algorithm
Optimizing Hybrid Wind/Diesel Generator System Using BAT Algorithm
 
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty SandEffect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
 
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical Review
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical ReviewEffect of Algal Bio-fertilizer on the Vigna radiata: A Critical Review
Effect of Algal Bio-fertilizer on the Vigna radiata: A Critical Review
 
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEW
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEWReal-Time Monitoring of Industrial Environmental Temperature using LabVIEW
Real-Time Monitoring of Industrial Environmental Temperature using LabVIEW
 
Speed Control of Induction Motor Using PLC and SCADA System
Speed Control of Induction Motor Using PLC and SCADA SystemSpeed Control of Induction Motor Using PLC and SCADA System
Speed Control of Induction Motor Using PLC and SCADA System
 
Review of Jobran Khalil Jobran's works from Romantic Features
Review of Jobran Khalil Jobran's works from Romantic FeaturesReview of Jobran Khalil Jobran's works from Romantic Features
Review of Jobran Khalil Jobran's works from Romantic Features
 
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...
A mathematical modeling proposal for a Multiple Tasks Periodic Capacitated Ar...
 
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...
How was Mathematics taught in the Arab-Islamic Civilization? – Part 1: The Pe...
 
Removal of Unwanted Objects using Image Inpainting - a Technical Review
Removal of Unwanted Objects using Image Inpainting - a Technical ReviewRemoval of Unwanted Objects using Image Inpainting - a Technical Review
Removal of Unwanted Objects using Image Inpainting - a Technical Review
 
A Modified Design of Test Pattern Generator for Built-In-Self- Test Applications
A Modified Design of Test Pattern Generator for Built-In-Self- Test ApplicationsA Modified Design of Test Pattern Generator for Built-In-Self- Test Applications
A Modified Design of Test Pattern Generator for Built-In-Self- Test Applications
 
Memory Polynomial Based Adaptive Digital Predistorter
Memory Polynomial Based Adaptive Digital PredistorterMemory Polynomial Based Adaptive Digital Predistorter
Memory Polynomial Based Adaptive Digital Predistorter
 
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...
Finite Element Analysis of Composite Deck Slab Using Perfobond Rib as Shear C...
 
A Critical View on Pedagogical Dimension of Architectural Education in India
A Critical View on Pedagogical Dimension of Architectural Education in IndiaA Critical View on Pedagogical Dimension of Architectural Education in India
A Critical View on Pedagogical Dimension of Architectural Education in India
 
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)
Studies of Degradation of Plasticized Polyvinyl Chloride (PPVC)
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit
5) Mütevâtirin Lügat ve Istılah Manâsı - Prof. Dr. Talat Koçyiğit
 
コストゼロで新卒採用のご提案
コストゼロで新卒採用のご提案コストゼロで新卒採用のご提案
コストゼロで新卒採用のご提案
 

Similar to The Riisk and Challllenges off Clloud Computtiing

Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewIOSR Journals
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...Amanda Summers
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
A Journey of Cloud Computing
A Journey of Cloud ComputingA Journey of Cloud Computing
A Journey of Cloud ComputingCETPA
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 

Similar to The Riisk and Challllenges off Clloud Computtiing (20)

Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Load Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A ReviewLoad Balancing In Cloud Computing:A Review
Load Balancing In Cloud Computing:A Review
 
G0314043
G0314043G0314043
G0314043
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
D045031724
D045031724D045031724
D045031724
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...A Literature Review On The Readiness For Providing Cloud Services Locally In ...
A Literature Review On The Readiness For Providing Cloud Services Locally In ...
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
A Journey of Cloud Computing
A Journey of Cloud ComputingA Journey of Cloud Computing
A Journey of Cloud Computing
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 

Recently uploaded

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

The Riisk and Challllenges off Clloud Computtiing

  • 1. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 5|P a g e TThhee RRiisskk aanndd CChhaalllleennggeess ooff CClloouudd CCoommppuuttiinngg Usman Namadi Inuwa M.Sc. Computer Science Department of Computer Science Jodhpur National University, Jodhpur Rajasthan, India Abstract Cloud computing is a computing technology aiming to share storage, computation, and services transparently among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and operated by third party service providers despite it sensitivity (example contact address, mails), the risks of disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage by third party is also increasing. The purpose of this study is to review researches done on this technology, identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud. Index Terms: Cloud Computing, Review, Security challenges, Threats. I. INTRODUCTION Computers have become absolutely necessary part of our life today. We need computers everywhere, be it for work, research or in any field. The computing resources we are using increases as the use of computer in our daily activities increase tremendously. For companies like Google and Microsoft, managing the resources when they need it is not a problem. But when it comes to smaller enterprises, affordability becomes a huge factor[25]. With the huge infrastructure come problems like machines failure, hard drive crashes, software bugs, etc. This might be a big headache for such a community. Cloud Computing offers a solution to this situation. Cloud computing helps in minimizing an organization‟s expenditure towards managing resources and also reduces the burden of maintaining software or hardware by its user. Cloud computing is an Internet-based computing technology, where shared resources such as software, platform, storage and information are provided to customers on demand. Cloud Computing is a computing platform for sharing resources that include infrastructures, software, applications, and business processes. Cloud Computing is a virtual pool of computing resources. It provides computing resources in the pool for users through internet. We are in the era in which information protection is the goal of every organisation. The rapid growth o f cloud computing has brought many security challenges for users and providers. And the risk of attacking both personal and organisational data store in cloud storage by an attacker is high as such computer expert are using many techniques for protecting users‟ data from unautherized party. This paper explore some of the approach use in protecting the confidentiality of users‟ data from service providers, and ensures service providers cannot collect users‟ confidential data while the data is processed and stored in cloud computing systems. To Understand the security issues of cloud computing which affect the confidentiality and vulunerability of this kind of system, this paper give a brief history of cloud computing and explore the deployment models and the service delivery models to identify the threat 1.2 BRIEF HISTORY AND DEFINITION Cloud Computing (CC) is a new term given to a technological evolution of distributed computing and grid computing[10]. The idea of computing in a "cloud" traces back to the origins of utility computing, a concept that computer scientist John McCarthy publicly proposed in 1961[3]. The general public has been leveraging forms of Internet-based computer utilities since the mid 1990s through various incarnations of search engines (Yahoo!, Google), e-mail services (Hotmail, Gmail), open publishing platforms (MySpace, Facebook, YouTube), and other types of social media (Twitter, LinkedIn)[3]. Without the development of ARPANET (Advance Research Projects Agency Network) by J.C.R.Licklider in 1960‟s and many other researchers who dream of improving the interconnection of systems, CC would never have come into existence[10]. A Gartner report listing cloud computing at the top of its strategic technology areas further reaffirmed its prominence as an industry trend by announcing its formal definition as[3]: RESEARCH ARTICLE OPEN ACCESS
  • 2. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 6|P a g e "...a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service to external customers using Internet technologies." Forrester Research provided its own definition of cloud computing as[3]: "...a standardized IT capability (services, software, or infrastructure) delivered via Internet technologies in a pay-per-use, self-service way." The definition that received industry-wide acceptance was composed by the National Institute of Standards and Technology (NIST)[3]. NIST published its original definition back in 2009, followed by a revised version after further review and industry input that was published in September of 2011[10]: "Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”[26]. This cloud model is composed of five essential characteristics, three service models, and four deployment models[3]. 1.3 BENEFIT OF CLOUD COMPUTING Before, people use to run applications or programs from software downloaded on a physical computer or server in their building. Cloud computing simplify this, cloud computing which is based on Internet allows people to access the same kind of application through the Internet[1]. But, why so many organization are moving to cloud? The reason may be the following:- (1) Flexibility: The aim of every business organisation is to have more customers and today's business are all online as customer increase in accessing organisation application, the amount of data that an application handles is increasing day by day and so is the CPU power that can harness. Organisation needs more bandwidth a cloud-based service can instantly meet the demand because of the vast capacity of the service's of remote servers. (2) Disaster Recovery: When an organisation start relying on cloud-based services, they no longer need complex disaster recovery plans. Cloud computing providers take care of most issues, and they do it faster. Aberdeen Group found that businesses which used cloud were able to resolve issues in an average of 2.1 hours nearly four times faster than those not on cloud[1]. (3) Automatic Software Update: In 2010, Uk companies spent 18 working days per month managing on-site security alone[1]. But today with cloud computing the providers do the server maintenance including security update within a short time, freeing up their customers' time and resources for other task. (4) Work From Anywhere: As long as there is internet access customers' and organisation employee can access there information anywhere. In addition, since document are stored dirctly onto the cloud, anyone with authorized access can access the documents and work on the same project at the same time. Avoiding time lost and documents with several untrackable versions. (5) Better for the Environment: Many small to corporate size companies require the use of mor servers to get jobs don because server utiliation rates are about 5-10%, whereas cloud utilization raates are int the 70% range, this is because cloud computing eliminates in-house servers, there is no need for the constant climate control involved in maintaing servers and elimanate carbon footprints. (6) Security: Large number of laptops with vital 0information are report yearly stolen or loss. This can have some serious monetary implications, but when everything is stored in the cloud, data can still be accessed no matter what happens to a machine. II. SECURITY ISSUES IN CLOUD COMPUTING Although there are many benefits to adopting Cloud Computing, there are also some significant barriers to adoption [6]. Because Cloud Computing represents a relatively new computing model, there is a great deal of uncertainty about how security at all levels (e.g., network, host, application, and data levels) can be achieved and how applications security is moved to Cloud Computing [7]. That uncertainty has consistently led information executives to state that security is their number one concern with Cloud Computing [8]. 2.1 SERVICE DELIVERY MODELS 2.1.1 Infrastructure as a Service (IaaS) Infrastructure as a Service is a single tenant cloud layer where the Cloud computing vendor‟s dedicated resources are only shared with contracted clients at a pay-per-use fee. The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications[4]. IaaS only provides basic security (perimeter firewall, load balancing, etc.) and applications moving into the cloud will need higher levels of security provided at the host.
  • 3. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 7|P a g e 2.1.2. Platform as a Service (PaaS) Platform-as-a-Service (PaaS) is a set of software and development tools hosted on the provider's servers. It is one layer above IaaS on the stack and offers an integrated set of developer environment that a developer can tap to build applications without having any clue about what is going on underneath the service. It offers developers a service that provides a complete software development life cycle management, from planning to maintenance [1]. 2.1.3 Software as a Service (SaaS) Software-as-a-Service is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. The architecture of SaaS-based applications is specifically designed to support many concurrent users (multitenancy) at once. The capability provided to the consumer is to use the provider‟s applications running on a cloud infrastructure[4]. 2.1.4 Anything as a Service (XaaS) Anything as a Service (XaaS): This is more general form of representing deployment of a service. These services could be of any type and „X‟ in XaaS can be substituted by software, hardware, infrastructure, data, business, IT, Security, monitoring, etc. These days new service models are being developed. Examples are: IT as a service, Cloud as a Service (CaaS), Management as a Service (MaaS), Storage as a Service, Hardware as a Service (HaaS), Identity as a Service, Privacy and Anonymization as a Service etc., are some other services that are identified in literature[10]. 2.2 CLOUD DEPLOYMENTS MODELS The Cloud Computing model has four main deployment models which are: I. Public cloud: describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third- party provider who shares resources and bills on a fine-grained utility computing basis. Public clouds are less secure than the other cloud models because it places an additional burden of ensuring all applications and data accessed on the public cloud are not subjected to malicious attacks. II. Community cloud: is similar to a public cloud except that its access is limited to a specific community of cloud consumers. The community cloud may be jointly owned by the community members or by a third-party cloud provider that provisions a public cloud with limited access[1]. Membership does not necessarily guarantee access to or control of all the cloud's IT resources. III. Private cloud:It is set up within an organization‟s internal enterprise data center. In the private cloud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organization itself, similar to Intranet functionality. Utilization on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure. Only the organization and designated stakeholders may have access to operate on a specific Private cloud.[12] IV. Hybrid cloud: is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network [14]. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Cloud provides more secure control of the data and applications and allows various parties to access information over the Internet. It also has an open architecture that allows interfaces with other management systems. 2.3 RISK AND CHALLENGES Several of the most critical cloud computing challenges and the security risk pertaining mostly to cloud consumers that use one of the services described above located in clouds are examine  Increased Security Vulnerabilities The moving of private and organizational data to the cloud guarantee access to share the data with the cloud provider. The remote usage of the services requires an expansion of trust boundaries by the cloud consumer to include the external cloud. It can be difficult to establish a security architecture that spans such a trust boundary without introducing vulnerabilities, unless cloud consumers and cloud providers happen to support the same or compatible security frameworks which is unlikely with public clouds[3].There can be overlapping trust boundaries from different consumers who share the same cloud services and resources. The overlapping of trust boundaries and the increased exposure of data can provide malicious cloud consumers (human and automated) with greater opportunities to attack IT resources and steal or damage business data[3].
  • 4. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 8|P a g e Figures- 1 The shaded area with diagonal lines indicates the overlap of two organizations' trust boundaries.  Reduced Operational Governance Control Cloud consumers are usually allotted a level of governance control that is lower than that over on premise IT resources. This reduced level of governance control can introduce risks associated with how the cloud provider operates its cloud, as well as the external connections that are required for communicate between the cloud and the cloud consumer.  Limited Portability Between Cloud Providers Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another[3]. Figure 2 - A cloud consumer's application has a decreased level of portability when assessing a potential migration from Cloud A to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as Cloud A.  Multi-Regional Regulatory and Legal Issues Cloud providers establish there data centers in affordable or convenient geographical locations. There is transparancy of the physical location of their resources and the data hosted in the clouds. For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies. For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom. Some countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data. For example, a European cloud consumer's data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. Patriot Act) when compared to data located in many European Union countries[3]. 2.4 THREATS IN CLOUD There are numerous security issues for cloud computing as it encompasses many technologies including networks, databases, operating systems, virtualization, resource scheduling, transaction management, load balancing, concurrency control and memory management [12]. The threats to information assets residing in the cloud can vary according to the cloud delivery models used by cloud user organizations[17]. Cloud computing alliance did research in 2013 on cloud computing security threats and identified these threats[14].  Traffic Hijacking  Insecure Interface and APIs.  Denial of Service.  Malicious Insiders.  Abuse of Cloud Services.  Insufficient Due Diligence.  Shared Technology Vulnerabilities  Data Breaches  Unknown Risk Profile  Perimeter Security Model Broken 2.5 PROPOSED SOLUTION Cloud providers should address information security and privacy risks associated with deploying information into any cloud computing environment. Below are some proposed solution to the issues discuss  Cloud providers should ensure that data in the cloud environment is tamper proof, protected through encryption at the kernel level. Communication between the customer and the provider's server is secure, thus avoiding the risk of any man-in-the-middle attacks to gain access to the encryption keys.
  • 5. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 9|P a g e  Cloud provider should use industry standard AES encryption to make data unreadable and unusable to those without the encryption key. Rendering the data useless greatly reduces the risks associated with data theft, exposure to unauthorized parties or data seizure through judicial subpoena.  Providers should provide a unique policy-based approach to key management and data access which allows users to determine exactly which server gets access to secure data. III. CONCLUSION As Individuals, government and non- governmental organization, small and large scale enterprises make plans to deploy their data and other applications in private, community and public cloud environments, new security challenges need to be addressed. Optimal cloud security practices should include encryption of sensitive data used by cloud- based virtual machines; centralized key management that allows the user (and not the cloud provider) to control cloud data; and ensuring that cloud data is accessible according to established enterprise policies. This paper discuss the benefit of using cloud computing, the risk and challenges of this new technology and the threat that are emerging which attack the confidentiality and vulnerability of the information in cloud. At the end proposed solution for safeguarding information in both private, public, community cloud services were cited. REFERENCES [1] Why Move to the cloud? http://www.salesforce.com/uk/socialsucess/c loud-computing/why-move-to-cloud-10- benefits-cloud-computing.jsp 24/10/2015 15:03 [2] Ken E. Stavinoha “What is cloud computing and why do we need it?” http://isacahouston.org/documents/WhatisCl oudComputingandWhyDoWeNeedIt.pdf 27/10/2015 00:09 [3] http://whatiscloud.com/cloud_deployment_ models/ 27/10/2015 2:01 [4] Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez (2013), An analysis of security issues for cloud computing, Journal of Internet Services and Application [5] Gartner Inc Gartner identifies the Top 10 strategic technologies for 2011. Online. Available: http://www.gartner.com/it/page.jsp?id=1454 221. Accessed: 15-Jul-2011 [6] KPMG (2010) From hype to future: KPMG‟s 2010 Cloud Computing survey.. Available: http://www.techrepublic.com/whitepapers/fr om-hype-to-future-kpmgs-2010-cloud- computing-survey/238429 [7] Rosado DG, Gómez R, Mellado D, Fernández-Medina E (2012) Security analysis in the migration to cloud environments. Future Internet 4(2):469–487 [8] Mather T, Kumaraswamy S, Latif S (2009) Cloud Security and Privacy. O‟Reilly Media, Inc., Sebastopol, CA [9] Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy (2011) Cloud Computing: Security Issues and Research Challenges, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011 [10] Santosh Bulusu, Kalyan Sudia (2012), A Study on Cloud Computing Security Challenges, Masters Thesis: School of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden. [11] Prince Jain (2012), Security Issues and their Solution in Cloud Computing, International Journal of Computing & Business Research - ISSN (Online): 2229-6166 [12] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, Security Issues for Cloud Computing, International Journal of Information Security and Privacy, 4(2), 39-51, University of Texas, USA, April-June 2010. [13] Thomas Erl, Zaigham Mahmood, Ricardo Puttini “Cloud Computing: Concepts, Technology & Architecture [14] Rajani Sharma, Rajender Kumar Trivedi (2014) “Literature review: Cloud Computing –Security Issues, Solution and Technologies” International Journal of Engineering Research Volu me No.3, Issue No.4, pp : 221-225 [15] Mohammad Sajid,Zahid Raza (2013), “Cloud Computing: Issues & Challenges”, International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV [16] Patrick Höner “Cloud Computing Security Requirements and Solutions: a Systematic Literature Review” [17] Jaydip Sen, “Security and Privacy Issues in Cloud C loud Computing” [18] Monjur Ahmed, Mohammad Ashraf Hossain “CLOUD COMPUTING AND S ECURITY ISSUES IN THE CLOUD” International Journal of Network Security & Its
  • 6. Usman Namadi Inuwa Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part – 4) December 2015, pp.05-10 www.ijera.com 10|P a g e Applications (IJNSA), Vol.6, No.1, January 2014 [19] Sharma, Rajeev, and Bright Keswani. "STUDY& ANALYSIS OF CLOUD BASED ERP SERVICES." [20] A. Kundu, C. D. Banerjee, P. Saha, “Introducing New Services in Cloud Computing Environment”, International Journal of Digital Content Technology and its Applications, AICIT, Vol. 4, No. 5, pp. 143-152, 2010. [21] Lizhe Wang, Jie Tao, Kunze M., Castellanos A.C., Kramer D., Karl W., “Scientific Cloud Computing: Early Definition and Experience,” 10th IEEE Int. Conference on High Performance Computing and Communications, pp. 825-830, Dalian, China, Sep. 2008, ISBN: 978-0-7695-3352- 0. [22] R. L Grossman, “The Case for Cloud Computing,” IT Professional, vol. 11(2), pp. 23-27, 2009, SSN: 1520-9202. [23] B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009. [24] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacon, “On technical Security Issues in Cloud Computing,” Proc. of IEEE International Conference on Cloud Computing (CLOUD-II, 2009), pp. 109-116, India, 2009. [25] Maheswaran.M (2008) “CLOUD COMPUTING”, seminar report, school of engineering cochin university of science and technology, cochin – 682022 [26] Patricia Yancey Martin and Barry A. Turner. Grounded theory and organizational research. The Journal of Applied Behavioral Science, 22(2):141–157, April 1986.