Security Apprehensions In Different Regions Of Cloud Captious Grounds

  • Singh G
  • Sharma A
  • Lehal M
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software's on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.

Cite

CITATION STYLE

APA

Singh, G., Sharma, A., & Lehal, M. S. (2011). Security Apprehensions In Different Regions Of Cloud Captious Grounds. International Journal of Network Security & Its Applications, 3(4), 48–57. https://doi.org/10.5121/ijnsa.2011.3405

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free