Cloud Computing and Security
Keywords:
Cloud Computing, Service Layers, Implementation Types, Trends, Future of Computer, Security in Cloud ComputingAbstract
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations to collaborate. Certainly cloud computing can bring about strategic, transformational and even revolutionary benefits fundamental to future enterprise computing but it also offers immediate and pragmatic opportunities to improve efficiencies today while cost effectively and systematically setting the stage for the strategic change. As this technology makes the computing, sharing, networking easy and interest ing, we should think about the security and privacy of information too. Thus the key points we are going to be discussed are what is cloud, what are its key features, current applications, future status and the security issues and the possible solutions.
References
. Bogatin, Donna. "Google CEO's new paradigm: 'cloud computing and advertising go hand-in-hand.'" ZDNet. Aug. 23, 2006. Retrieved March 11, 2008. http://blogs.zdnet.com/micro - markets/?p=369
. Brodkin, Jon. "IBM unveils 'cloud computing.'" Network World. Nov. 19, 2007. Vol. 24, Iss. 45. pg. 10.
. Carr, Nicholas. "'World Wide Computer' is on horizon." USA Today. February 25, 2008.
. Hickins, Michael. "Cloud Computing Gets Down to Earth." eWeek. January 21, 2008. pg. 14.
. "IBM Introduces Ready-to-Use Cloud Computing." IBM. Nov. 15, 2007. http://www-
. Lohr, Steve. "Cloud Computing and EMC Deal." New York Times. Feb. 25, 2008. pg. C 6.
. An Oracle White Paper in Enterprise Architechture, ―Architechtural Strategies for Cloud Computing‖, Aug 2009.
. Debashish Das, ―Cloud Computing—New Cutting Edge to Business‖, Feb 2009.
. ‗Mastering Cloud Computitng‘, McGraw Hill publications book.
. ‗Privacy Manager‘ INFOCOM, 2010 Proceedings IEEE
. Lohr, Steve. " Google and I.B.M. Jon in 'Cloud Computing' Research." New York Times. Oct. 8, 2007. pg. C 8.
. Lohr, Steve. "I.B.M. to Push 'Cloud Computing,' Using Data From Afar." New York Times. Nov. 15, 2007. pg. C 7.
. McAllister, Neil. "Server virtualization."InfoWorld. Feb. 12, 2007. Retrieved March 12, 2008. http://www.infoworld.com/article 07/02/12/07FEvirtualserv_1.html
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.