Academic Journals Database
Disseminating quality controlled scientific knowledge

Security Apprehensions In Different Regions Of Cloud Captious Grounds

ADD TO MY LIST
 
Author(s): Gurdev Singh | Amit Sharma | Manpreet Singh Lehal

Journal: International Journal of Network Security & Its Applications
ISSN 0975-2307

Volume: 3;
Issue: 4;
Start page: 48;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Cloud Computing | Data Security | Secure Servers | Secure Network.

ABSTRACT
Cloud computing is a new innovative model for enterprise in which information is permanently stored onthe servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems aboutreliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions