Significant Security Aspects in Cloud Computing Based Data Centers
AUTHORS
Sibongile Simelane,University of Quebec in Montreal, Canada
N.Thirupathi Rao,Department of Computer Science & Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam, AP, India
Debnath Bhattacharyya,Department of Computer Science & Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam, AP, India
ABSTRACT
With the closeness of the web and the improvement of electronic business entries and relational relations, affiliation done the biosphere marks a generous measure of insights arrange by organize. Additionally, coordinate security issues are at the present time persuading the chance to be essential as civilization is touching towards modernized data age. As a reliably growing number of client interface with the web it pulls in a broad measure of cutting edges gangsters. It fuses underwriting of access to data in a structure, measured by the scheming chief. This article discussion around the cutting edge for a wide degree of cryptographic considers that are exploited by a bit of systems association submissions. This positions various novel safety confronts which contain totally realized. In this paper, we generally spotlight on perspectives for offering safety to information accumulating in dim, furthermore building for information amassing that are realized by additional expert centers dealers in dim, key concentrations for showing safety for further information storing.
KEYWORDS
Security techniques, Space issues for security, Architecture, Cloud computing, Firewalls
REFERENCES
[1] Bernstein, David, Erik Ludvigson, Krishna Sankar, Steve Diamond, and Monique Morrow, “Blueprint for the intercloud protocols and formats for cloud computing interoperability,” International Conference on Internet and Web Applications and Services, vol.49, pp.328–336, (2009)
[2] Erdogmus Hakan, “Cloud computing: Does nirvana hide behind the nebula,” IEEE Software, vol.26, no.2, pp.4–6, (2011)
[3] Gellman and Robert, “Privacy in the clouds: Risks to privacy and confidentiality from cloud computing,” Technical report, World Privacy Forum, February, vol.19, (2009)
[4] Greenberg, Albert, James Hamilton, David A. Maltz, and Parveen Patel, “The cost of a cloud: research problems in data center networks,” SIGCOMM Computational Communications Review, vol.39, no.1, pp.68–73, (2009)
[5] Grossman and Robert L, “The case for cloud computing,” IT Professional, vol.11, no.2, pp.23–27, (2009)
[6] Hayes Brian, “Cloud computing,” Communications of the ACM, vol.51, no.7, pp.9–11, (2014)
[7] Leavitt Neal, “Is cloud computing really ready for primetime Computer, vol.42, no.1, pp.15–20, (2012)
[8] Lin Geng, David Fu, Jinzy Zhu, and Glenn Dasmalchi, “Cloud computing: It as a service,” IT Professional, vol.11, no.2, pp.10–13, (2009)
[9] Pfitzmann, Birgit, and michael waidner, “Security protocols, lecture notes in computer science,” chapter Federated Identity Management Protocols, vol.52, pp.153–174, (2004)
[10] Recordon David and Drummond Reed, “Openid 2.0: a platform for user centric identity management,” In DIM 2006: Proceedings of the second ACM workshop on Digital identity management, New York, NY, USA, pp.11–16, (2006)