Academic Journals Database
Disseminating quality controlled scientific knowledge

An Initial Approach to Provide Security in Cloud Network

Author(s): Dr. S. Srinivasu, K.P.R KrishnaChaitanya, K.Naresh Kumar

Journal: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
ISSN 2278-1323

Volume: 1;
Issue: 5;
Start page: 070;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Cloud computing | Policy Management | Security Violations | Cloud Services | DHCP Servers | Cloud Controls Matrix.

Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications and services provisioned “on demand” regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management and better align IT services with dynamic business requirements. In many ways, cloud computing offers the “best of both worlds” providing solid support for core business functions along with the capacity to develop new and innovative services. Although the benefits of cloud computing are clear, so is the need to develop proper security for cloud implementations. Because without a security policy, the availability of cloud service can be compromised. The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a cloud security [1, 5] change management practice and monitoring the network for security violations in cloud.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?