It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

World of Cloud Computing & Security | Kumar | International Journal of Cloud Computing and Services Science (IJ-CLOSER)

World of Cloud Computing & Security

Ashish Kumar

Abstract


Cloud computing promises to increase the velocity with which application are deployed, increase innovation and lower costs, all while increasing business agility and hence envisioned as the next generation architecture of IT Enterprise. Nature of cloud computing builds an established trend for driving cost out of the delivery of services while increasing the speed and agility with which services are deployed. Cloud Computing incorporates virtualization, on demand deployment, Internet delivery of services and open source software .From another perspective, everything is new because cloud computing changes how we invent, develop, deploy, scale, update, maintain and pay for application and the infrastructure on which they run. Because of these benefits of Cloud Computing, it requires an effective and flexible dynamic security scheme to ensure the correctness of users’ data in the cloud. Quality of service is an important aspect and hence, extensive cloud data security and performance is required.

ashish.kumar@bharatividyapeeth.edu


References


Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’,IDC eXchange, from http://blogs.idc.com/ie/?p=73.

E. Grosse, “Security at Scale,” invited talk, ACM Cloud Security Workshop (CCSW), 2010; http://wn.com/2010_Google_Faculty_Summit_Security_at_Scale.

Ramgovind S, Eloff MM, Smith E “The Management of Security in Cloud Computing” in IEEE 2010.

http://en.wikipedia.org/wiki/Virtual_private_ cloud

A Platform Computing Whitepaper, ‘Enterprise Cloud Computing:Transforming IT’, Platform Computing, pp6, viewed 13 March 2010.

Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker Siemens “Understanding clouds vulnerabilities. In IEEE 2011.

Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou “Security and Privacy in Cloud Computing: A Survey” in IEEE 2010.

Farzad Sabahi , “Cloud computing threats and responses” in IEEE 2011.

Jianfeng Yang & Zhibin Chen “Cloud computing Research and security issues” in IEEE 2010.

Cloud Security Alliance Web site, http://www.cloudsecurityalliance.org/.

L. Wang et al., 1. “Scientific Cloud Computing: Early Definition and Experience,” Proc. 10th Int’l Conf. High-Performance Computing and Communications (HPCC 08), IEEE CS Press, 2008, pp. 825–830.

“US Federal Cloud Computing Market Forecast 2010–2015,” tabular analysis, publication: 05/2009.

Isaac Agudo , David Nuñez , Gabriele Giammatteo , Panagiotis Rizomiliotis, Costas Lambrinoudakis “ Cryptography goes to cloud”

Hongwei Li, Yuanshun Dai1, Ling Tian, and Haomiao Yang “Identity-Based Authentication for Cloud Computing” in Springer-Verlag Berlin Heidelberg 2009.

Liang Yan1, Chunming Rong1, and Gansen Zhao2 “Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography” in IEEE 2009.


Full Text: PDF
Download Citation: RIS (for Reference Manager, ProCite, EndNote, Mendeley ) | Bibtex  

Refbacks

  • There are currently no refbacks.