Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Guidelines for Security in Cloud Computing


Affiliations
1 PITAM, Chennai – 602 025, India
2 Sakthi Mariamman Engineering College, Thandalam, Chennai–602 105, India
     

   Subscribe/Renew Journal


Cloud computing tends to be fast and rapid in our Internet environment especially in the field of IT which demands on large scale network computing. Cloud computing is able to provide its customer numerous services through Internet. Cloud computing is suffering from several issues are of the most significant Security, Service availability, integrity, authentication and storage. Security is shared responsibility of both client and service provider. In this I will focus on the development of cloud computing in security issues related with the privacy and dependability, which may be considered as the key factors that affects the security risks and suggestions and recommendation on particular area.


Keywords

Cloud Computing, Services, Security, Integrity and Storage.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 343

PDF Views: 3




  • Guidelines for Security in Cloud Computing

Abstract Views: 343  |  PDF Views: 3

Authors

S. K. Srivatsa
PITAM, Chennai – 602 025, India
S. Nagasundaram
Sakthi Mariamman Engineering College, Thandalam, Chennai–602 105, India

Abstract


Cloud computing tends to be fast and rapid in our Internet environment especially in the field of IT which demands on large scale network computing. Cloud computing is able to provide its customer numerous services through Internet. Cloud computing is suffering from several issues are of the most significant Security, Service availability, integrity, authentication and storage. Security is shared responsibility of both client and service provider. In this I will focus on the development of cloud computing in security issues related with the privacy and dependability, which may be considered as the key factors that affects the security risks and suggestions and recommendation on particular area.


Keywords


Cloud Computing, Services, Security, Integrity and Storage.