Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/14734
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSuman Madan-
dc.contributor.authorKanika Behl-
dc.date.accessioned2024-03-02T06:29:20Z-
dc.date.available2024-03-02T06:29:20Z-
dc.date.issued2012-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/14734-
dc.description.abstractCloud Computing - a new way of less expensive services-based environment is becoming popular. It has proved to be the cost-effective solution to various organizations to cater for their computing needs without investing in computing infrastructure. Cloud is a major next step in this area. Cloud computing allows various tasks to be executed over a network using various services. Using Cloud computing, clients do not need to spend on hardware and expensive software(s). It allows them to buy hardware resources online, take an entire platform for software development, or set up a platform themselves, in-house. By using simple PCs and using internet connections, one can use cloud computing services provided by special providers (e.g. Google, Facebook, Amazon, Microsoft, and others). However, cloud computing is not free from issues. One of the major issues slowing cloud computing growth is security. Critical issues with the customer data and applications process may occur. This paper discusses security issues related to cloud computing and proposes necessary strategies for securing cloud that could be helpful to build faithful relationship between customer and cloud provider.-
dc.publisherJournal of Banking Information Technology and Management-
dc.subjectCloud computing-
dc.subjectNetwork security-
dc.subjectCloud models-
dc.titleStrategies for Securing Cloud-
dc.volVol. 9-
dc.issuedNo. 1-
Appears in Collections:Articles to be qced

Files in This Item:
File SizeFormat 
Strategies for Securing Cloud.pdf
  Restricted Access
4.19 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.