Open Access Open Access  Restricted Access Subscription Access

Key Security Problems - Research Challenges Regarding Cloud Computing

Ajinkya S. Shewale

Abstract


On request or on pay in step with utilization of helpful asset comprising of: system, stockpiling and server these all offices are outfitted by utilizing distributed computing through web is known as distributed computing. Regardless of the way that, distributed computing is encouraging the realities time venture, the innovative work on this territory is yet to be fine. We have commitment on this paper is a confounded review that have practical experience in distributed computing idea and most developed research issues. This paper manages a higher mastery of the distributed computing and distinguishes basic examinations inconveniences on this expanding region of PC mechanical expertise. Stage 1 incorporates the presentation, inside the stage 2, we offer a layout of distributed computing, stage three comprises of the security design and stage four will mindfulness on the exploration issues and wellbeing inconvenience. We finish the paper on section five together with references.


Full Text:

PDF

References


Ajinkya Shewale, “Enhanced Identity Management and Security in IoT backing with Cloud Using ICAC” in ICICA 2016 International Conference on Intelligent Computing and Applications and 3rd international conference on Po, Circuit and Information Technologies. ISSN:0974-5572

Abbadi, I.M. and Martin, A., “Trust in the Cloud”, Information Security Technical Report, 16, 2011:108-114p.

Casola, V., Cuomo, A., Rak, M. and Villano, U., “The Cloud Grid approach: Security analysis and performance evaluation”, Future Generation Computer Systems.2013.29:387-401p.

https://www.researchgate.net/publication/317908867_Cloud_Computing_and_Security_Issues

http://uru.ac.in/uruonlinelibrary/Cloud_Computing/Cloud%20Computing%20Security%20Issues.pdf


Refbacks

  • There are currently no refbacks.