Security Challenges of Service and Deployment Models
Keywords:
Cloud Models, Service Model, Deployment Model.Abstract
Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology's. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. This paper provides the security challenges of service and deployment models.
References
- J. and Hong, S. (2012). A Consolidated Authentication Model in Cloud Computing Environments. International Journal of Multimedia and Ubiquitous Engineering, 7(3), 151-160.
- Kim, W. (2009). Cloud Computing: Today and Tomorrow. Journal of Object technology, 8(1), 65-72.
- King, N.J. and Raja, V.T. (2012).Protecting the privacy and security of sensitive customer data in the cloud. Computer Law and Security Reviews, 28, 308-319.
- Kumar, A. (2012). World of Cloud Computing & Security. International Journal of Cloud Computing and Services Science, 1(2), 53-58.
- Kuyoro, S.O., Ibikunle, F. and Awodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks, 3(5), 247-255.
- Lee, K. (2012). Security Threats in Cloud Computing Environments. International Journal of Security and Its Application, 6(4), 25-32.
- Sudheer Kumar Shriramoju,, “A Review on Database Security and Advantages of Database Management System”, Journal of Advances in Science and Technology, Vol. V, Issue No. X, August-2013
- Sudheer Kumar Shriramoju, "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1 Issue 3, pp. 215-220, July-August 2015.
- Sudheer Kumar Shriramoju, “Review on NoSQL Databases and Key Advantages of Sharepoint”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN(Online): 2319-8753, ISSN (Print): 2347-6710, Vol. 7, Issue 11, November 2018.
- Sudheer Kumar Shriramoju, “Capabilities and Impact of SharePoint On Business”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, November-December-2017.
- Sudheer Kumar Shriramoju, “Security Level Access Error Leading to Inference and Mining Sequential Patterns”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4, July-August 2016
- Sudheer Kumar Shriramoju, “An Overview on Database Vulnerability and Mining Changes from Data Streams”, International Journal of Information Technology and Management, Vol. VII, Issue No. IX, August-2014
- Sudheer Kumar Shriramoju, “A Comprehensive Review on Database Security Threats and Visualization Tool for Safety Analyst”, International Journal of Physical Education and Sports Sciences, Vol. 14, Issue No. 3, June-2019
- Sudheer Kumar Shriramoju, “Integrating Information from Heterogeneous Data Sources and Row Level Security”, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII, October-2012
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.