Cloud Computing and Security

Authors

  • Shinde A Computer Department, P.V.P.P .College of Engineering, Mumbai University, India
  • Ghadge S swapna.care@gmail.com
  • Vinod Alone Computer Department, P.V.P.P .College of Engineering, Mumbai University, India
  • Shinde J Computer Department, P.V.P.P .College of Engineering, Mumbai University, India

Keywords:

Cloud Computing, Service Layers, Implementation Types, Trends, Future of Computer, Security in Cloud Computing

Abstract

This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations to collaborate. Certainly cloud computing can bring about strategic, transformational and even revolutionary benefits fundamental to future enterprise computing but it also offers immediate and pragmatic opportunities to improve efficiencies today while cost effectively and systematically setting the stage for the strategic change. As this technology makes the computing, sharing, networking easy and interest ing, we should think about the security and privacy of information too. Thus the key points we are going to be discussed are what is cloud, what are its key features, current applications, future status and the security issues and the possible solutions.

References

. Bogatin, Donna. "Google CEO's new paradigm: 'cloud computing and advertising go hand-in-hand.'" ZDNet. Aug. 23, 2006. Retrieved March 11, 2008. http://blogs.zdnet.com/micro - markets/?p=369

. Brodkin, Jon. "IBM unveils 'cloud computing.'" Network World. Nov. 19, 2007. Vol. 24, Iss. 45. pg. 10.

. Carr, Nicholas. "'World Wide Computer' is on horizon." USA Today. February 25, 2008.

. Hickins, Michael. "Cloud Computing Gets Down to Earth." eWeek. January 21, 2008. pg. 14.

. "IBM Introduces Ready-to-Use Cloud Computing." IBM. Nov. 15, 2007. http://www-

. Lohr, Steve. "Cloud Computing and EMC Deal." New York Times. Feb. 25, 2008. pg. C 6.

. An Oracle White Paper in Enterprise Architechture, ―Architechtural Strategies for Cloud Computing‖, Aug 2009.

. Debashish Das, ―Cloud Computing—New Cutting Edge to Business‖, Feb 2009.

. ‗Mastering Cloud Computitng‘, McGraw Hill publications book.

. ‗Privacy Manager‘ INFOCOM, 2010 Proceedings IEEE

. Lohr, Steve. " Google and I.B.M. Jon in 'Cloud Computing' Research." New York Times. Oct. 8, 2007. pg. C 8.

. Lohr, Steve. "I.B.M. to Push 'Cloud Computing,' Using Data From Afar." New York Times. Nov. 15, 2007. pg. C 7.

. McAllister, Neil. "Server virtualization."InfoWorld. Feb. 12, 2007. Retrieved March 12, 2008. http://www.infoworld.com/article 07/02/12/07FEvirtualserv_1.html

Downloads

Published

2024-02-26

How to Cite

Shinde, A., Ghadge, S., Alone, V., & Shinde, J. (2024). Cloud Computing and Security. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(08), 1048–1052. Retrieved from https://ijact.in/index.php/j/article/view/184

Issue

Section

Original Research Article

Similar Articles

<< < 17 18 19 20 21 22 23 24 25 26 > >> 

You may also start an advanced similarity search for this article.