Open Access   Article Go Back

A Study on Virtue and Faults of Security in Cloud Computing

N.K. Singh1 , A.K. Singh2

Section:Survey Paper, Product Type: Journal Paper
Volume-5 , Issue-1 , Page no. 93-94, Jan-2017

Online published on Jan 31, 2017

Copyright © N.K. Singh, A.K. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N.K. Singh, A.K. Singh, “A Study on Virtue and Faults of Security in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.93-94, 2017.

MLA Style Citation: N.K. Singh, A.K. Singh "A Study on Virtue and Faults of Security in Cloud Computing." International Journal of Computer Sciences and Engineering 5.1 (2017): 93-94.

APA Style Citation: N.K. Singh, A.K. Singh, (2017). A Study on Virtue and Faults of Security in Cloud Computing. International Journal of Computer Sciences and Engineering, 5(1), 93-94.

BibTex Style Citation:
@article{Singh_2017,
author = {N.K. Singh, A.K. Singh},
title = {A Study on Virtue and Faults of Security in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2017},
volume = {5},
Issue = {1},
month = {1},
year = {2017},
issn = {2347-2693},
pages = {93-94},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1164},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1164
TI - A Study on Virtue and Faults of Security in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - N.K. Singh, A.K. Singh
PY - 2017
DA - 2017/01/31
PB - IJCSE, Indore, INDIA
SP - 93-94
IS - 1
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
588 476 downloads 466 downloads
  
  
           

Abstract

Cloud computing is a web technology computing which requires large scale processing and computing. For this extensive processing, it requires security and protection in cloud computing for shareable configurable resources for on-demand access. This paper describes about the cloud computing merits and demerits of existing security and protection models in cloud computing

Key-Words / Index Term

indexing, private cloud,protected cloud, public cloud, service provider, client owner

References

[1] A. K. Singh, �A Study on Merits and Demerits of SAN Protocols,� vol. 3, no. X, pp. 1�5, 2015.
[2] X. Qiu, Y. Dai, Y. Xiang, L. Xing, and S. Member, �Reliability, Performance , and Power Consumption of a Cloud Service,� vol. 46, no. 3
[3] Surabhi Shukla and Dharamjeet kumar, "Cloud�s Software- Security as a Service(S-SaaS) via Biometrics", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (119-124), Mar -2014
[4] W. Li, Y. Yang, and D. Yuan, �Ensuring Cloud Data Reliability with Minimum Replication by Proactive Replica Checking,� IEEE Trans. Comput., vol. 65, no. 5
[5] M. Kangas, S. Glisic, S. Member, Y. Fang, and P. Li, �Resource Harvesting in Cognitive Wireless Computing Networks With Mobile Clouds and Virtualized Distributed Data Centers : Performance Limits,� IEEE Trans. Cogn. Commun. Netw., vol. 1, no. 3
[6] Richa Arya , "Triple Security of File System for Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (148-154), Mar -2014
[7] G. Fan, H. Yu, S. Member, and L. Chen, �A Formal Aspect-Oriented Method for Modeling and Analyzing Adaptive Resource Scheduling in Cloud Computing,� vol. 13, no. 2, p.
[8] Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013.
[9] J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, �Information Flow Control for Secure Cloud Computing,� IEEE Trans. Netw. Serv. Manag., vol. 11, no. 1,
[10] M. Amoon, �Adaptive Framework for Reliable Cloud Computing Environment,� IEEE Access, vol. 3536, no. c
[11] K. Goyal, �International Journal of Advanced Research in Computer Science and Software Engineering Review of Different Energy Saving Techniques in Cloud Computing,� vol. 3, no. 7, pp. 1038�1042, 2013.
[12] A. Sharma, S. Gupta, D. Mann, and S. Akhtar, �A Combined Model to Ensure Complete Security and Reliability in Cloud Computing,� vol. I, pp. 21�24, 2015.