Efficient Appraisal of Cloud Computing Through Comprehensive Confrontation of Security Issues and Discrepancies Involved

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : Rajesh T , Vihari P

Citation 

Rajesh T , Vihari P. "Efficient Appraisal of Cloud Computing Through Comprehensive Confrontation of Security Issues and Discrepancies Involved". International Journal of Engineering Trends and Technology (IJETT). V4(5):1485-1490 May 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Cloud computing is a new computational paradigm that an innovative business model allows organizations to adopt without prior IT investments well. Despite the potential benefits derived from the cloud computing, the security model is still the question of where the cloud model affects adoption. The security problem is complicated by the cloud model as new dimensions of the problem scope with respect to the model architecture, multi - tenancy, elasticity, and were entered. Dependency stack In this paper, a detailed analysis of the cloud security problem we. Introduce We investigated the problem from the persp ective of architecture cloud, the cloud features offered perspective, the perspective of the cloud stakeholders, and cloud service delivery models perspective. Based on this analysis, we conduct a detailed specification of the cloud security problem and the main functions to be covered by any proposed security.

References

[1] NIST. October, (2010). National Vulnerability Database (NVD) . Available: http://nvd.nist.gov/home.cfm .
[2] Microsoft. (2006, October, 2010). Multi - Tenant Data Architecture . Available: http://msdn.microsoft.com/en - us/library/aa479086.aspx
[3] IDC, "IDC Ranking of issues of Cloud Computing model," ed, 2009, http://bl ogs.idc.com/ie/?p=210 , Accessed on July 2010.
[4] Cloud Computing Use Case Discussion Group, "Cloud Computing Use Cases Version 3.0," 2010.
[5] S. Subashini, ,Kavitha, V., "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. In Press, Corrected Proof.
[6] Cloud Security Alliance (CSA). (2010). Available: http://www.cloudsecurityalliance.org/
[6] Balachandra Reddy Kandukuri, Ramakrishna Paturi and Atanu Rakshit, "Cloud Security Issues, " in Proceedings of the 2009 IEEE International Conference on Services Computing , 2009, pp. 517 - 520.
[7] Kresimir Popovic , Zeljko Hocenski, "Cloud computing security issues and challenges," in The Third International Conference on Advances in Human - orient ed and Personalized Mechanisms, Technologies, and Services , 2010, pp. 344 - 349.
[8] Meiko Jensen, Jörg Schwenk, Nils Gruschka and Luigi Lo Iacono, "On Technical Security Issues in Cloud Computing," in IEEE ICCC , Bangalore 2009, pp. 109 - 116 .
[9] Bernd Grobau er, Tobias Walloschek and Elmar Stocker" Understanding Cloud - Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010 .
[10] D. K. Holstein, , Stouffer, K., "Trust but Verify Critical Infrastructure

Keywords
cloud computing; cloud computing security; cloud computing security management.