Open Access Open Access  Restricted Access Subscription Access

Data Security and Risk Analysis in Cloud Computing Environment

Alok Singh Chauhan

Abstract


As of late, distributed computing has been a rising figuring model in the IT business. Machines required in distributed computing convey administrations in an adaptable way. It gives capable figuring by bringing together stockpiling, memory taking care of and transmission limit. Getting conveyed processing can achieve both positive and negative outcomes for data security. This paper essentially hopes to highlight the critical security issues existing in current dispersed registering circumstances. This paper displays a find out about the peril issues required in dispersed processing. We moreover propose a threat examination approach that can be used by an impending cloud organization for researching the data security perils before putting his grouped data into a conveyed figuring environment. 


Full Text:

PDF

References


N. Leavitt. Is cloud computing really ready for prime time?Computer. 2009; 42(1): 15–25p.

P. Mell, T. Grance. The nist definition of cloud computing.National Institute of Standards and Technology. 2009;53(6).

J. Heiser, M. Nicolett.Accessing the security risks of cloud computing. Gartner, Inc., Stamford, CT; 2008.

AmitSangorya, Saurabh Kumar, JaiDeep Dhok, et al. Towards analyzing data security risks in cloud computing environments. InternationalConference on Information Systems, Technology, and Management. 2010.

www.wikipedia.org: Introduction to cloud computing and Architecture.

Balachandra R K, Ramakrishna P V, Dr. Rakshit A. Cloud security issue.IEEE International Conference on Services Computing. 2009;517–520p.

Cloud computing use cases whitepaper. 2009. http://www.scribd.com/doc/17929394/Cloud-Computing-Use-Cases-Whitepaper.

SnehaPrabhaChandran, MridulaAngepat. Cloud computing: Analysing the risks involved in cloud computing environments.

Jon Brodkin. Seven cloud-computing security risks.

http://www.networkworld.com/news/2008/070208-cloud.html.

Hayes, B. Cloud computing. Communications ACM. 2008; 51: 9–11p.

Yunchuan Sun, Junsheng Zhang, YongpingXiong, Guangyu Zhu. Data security and privacy in cloud computing.International Journal of Distributed Sensor Networks. http://dx.doi.org/10.1155/2014/190903.


Refbacks

  • There are currently no refbacks.