Study of Services and Privacy Usage in Cloud Computing

Authors

  • Rakesh Prasad Sarang Computer Science & Application, IPS College Gwalior, India
  • Rajesh Kumar Bunkar Computer Science, IGN Tribal University, Amarkantak, India

Keywords:

Cloud Computing, Service Models, Vulnerability Privacy, Cloud Usage

Abstract

In last decade, there are several survey point out over privacy and services has risen and increasingly becoming central point for IT industries. Almost every day, IT sector, network security and sensitive data are being broken. This uses more advanced techniques to protect their information. Privacy is a very essential issue for cloud computing. Hence there is a need of an effective privacy and security that protect data, information and technology resources adequately. This survey focus on cloud computing, its architecture, services and identifies the cloud computing privacy. In this paper, we are presenting a service models to deal with the privacy and security problems in cloud computing environment. We elaborate privacy and service models as considered in cloud computing resources and the proper preventing their data. There are multifarious security and privacy that need to be understood. The paper includes some privacy and techniques that show the motivation for the adoption of cloud computing.

 

References

Rao, Srinivasa, and V Nageswara Rao, “Cloud Computing: an Overview”, (JATIT) Journal of Theoretical and Applied Information Technology, 71-76, 2009.

Khorshed, Tanzim, A B M Shawkat Ali, and Saleh A Wasimi, “A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing”, Future Generation Computer Systems, 833-851, 2012.

Ruiter, Joep, and Martijn Warnier, “Privacy Regulations for Cloud Computing”, 1-16.

Sun D, Chang G, Sun L, Wang X, “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud computing Environment”, Elsevier Procedia Engineering, 2852-2856, 2011.

Metri, Priya, Sarote, Geeta,”Privacy Issues and Challenges in Cloud Computing”, (IJAEST) International Journal of Advanced Engineering Sciences and Technologies, vol. 5, 1-6, 2011.

Sultan, Nabil, “Cloud Computing for Education: A New Dawn”, (IJIM) International Journal of Information Management, 30 109-116, 2010.

San Francisco, CA Chappell and Associates Chappell, D. A. “Short introduction to Cloud platforms: An Enterprise-Oriented view”, Aug. 2008.

Bhadauria, Rohit, Chaki, Rituparna, Nabendu, Sanyal, Sugata, “A Survey on Security Issues in Cloud Computing”, Electronics and Communications.

Jens, F. Jones, M. T. “Cloud computing with Linux Defining Cloud services and cloud computing”, Sept. 2008.

Scalable Security Solutions, Check Point Open Performance Architecture, Quad Core Intel Xeon Processors, “Delivering Application-Level Security at Data Centre Performance Levels”, IntelCorporation,2008.http://download.intel.com/netcomms/technologies/security.

Kumar, Pardeep, Sehgal, Vivek, Chauhan, Durg, Singh, Gupta, P K, and Diwakar, Manoj “Effective Ways of Secure, Private and Trusted Cloud Computing”, (IJCSI) International Journal of Computer Science Issues, vol.8, 412-421, May. 2011.

Jansen, Wayne A, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, 44th Hawaii International Conference on System Sciences, 1-10, Oct. 2011.

Alvi, F. A., Choudary, B. S., & Jaferry, N., “A review on cloud computing security issues & challenges”.

Ercan, T., “Effective use of cloud computing in educational institutions”, Sciences-New York, 2, 938-942.sbspro, 130, 2010.

Open Grid Forum. “Cloud Storage for Cloud Computing Storage Networking Industry Association”, http://www.snia.org/cloud/ Cloud Storage for Cloud Computing, 2009.

Mircea, M., “Addressing Data Security in the Cloud”, Intelligence World Academy of Science, Engineering and Technology 6, 539-546, 2012.

S. Jordan, and A. Bruno, “CCDA 640-864 Official Cert Guide, 4th Edition”, Indianapolis: Cisco Press. 2011.

Downloads

Published

2013-12-30

How to Cite

[1]
R. P. Sarang and R. K. Bunkar, “Study of Services and Privacy Usage in Cloud Computing”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 1, no. 6, pp. 7–12, Dec. 2013.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.