Downloads: 107 | Views: 260
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.4 / 10
Cloud Computing Security Issues and Control Mechanisms
Shital B. Patil, Dr. Shashi U. Ghumbre
Abstract: In cloud computing services, security and privacy concerns are like those of traditional non-cloud services, concerns are amplified by outer control over organizational resources and the potential for mismanagement of those resources. Transitioning to public cloud computing includes an exchange of responsibility and control to the cloud provider over data and system components that were already under the organization-s direct control. The transition is normally accompanied by loss of direct control over the management of operations furthermore a loss of impact over decisions made about the computing environment. Regardless this underlying loss of control, the cloud service consumer still needs to take responsibility for their utilization of cloud computing services to keep up situational awareness, measure choices, set needs, and impact changes in security and privacy that are to the greatest advantage of the organization. The consumer attains to this by guaranteeing that the contract with the provider and its related Service Level Agreement (SLA) has proper provisions for security and privacy. Specifically, the SLA must help keep up legal protections for security identifying with information stored on the provider-s system. The consumer must also ensure proper integration of the cloud computing services with their own systems for managing security and privacy.
Keywords: cloud computing, privacy, security, service level agreement SLA
Edition: Volume 4 Issue 5, May 2015
Pages: 2208 - 2213
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad