Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015
Cloud Computing Security Issues and Control Mechanisms
Shital B. Patil, Dr. Shashi U. Ghumbre
In cloud computing services, security and privacy concerns are like those of traditional non-cloud services, concerns are amplified by outer control over organizational resources and the potential for mismanagement of those resources. Transitioning to public cloud computing includes an exchange of responsibility and control to the cloud provider over data and system components that were already under the organization-s direct control. The transition is normally accompanied by loss of direct control over the management of operations furthermore a loss of impact over decisions made about the computing environment. Regardless this underlying loss of control, the cloud service consumer still needs to take responsibility for their utilization of cloud computing services to keep up situational awareness, measure choices, set needs, and impact changes in security and privacy that are to the greatest advantage of the organization. The consumer attains to this by guaranteeing that the contract with the provider and its related Service Level Agreement (SLA) has proper provisions for security and privacy. Specifically, the SLA must help keep up legal protections for security identifying with information stored on the provider-s system. The consumer must also ensure proper integration of the cloud computing services with their own systems for managing security and privacy.
Keywords: cloud computing, privacy, security, service level agreement SLA
Edition: Volume 4 Issue 5, May 2015
Pages: 2208 - 2213
How to Cite this Article?
Shital B. Patil, Dr. Shashi U. Ghumbre, "Cloud Computing Security Issues and Control Mechanisms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154521, Volume 4 Issue 5, May 2015, 2208 - 2213
Similar Articles with Keyword 'cloud computing'
Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Cloud Computing and Its Types in Mobile Network
Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Similar Articles with Keyword 'privacy'
Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Similar Articles with Keyword 'security'
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Energy Efficient Sensory Data Collection in Wireless Sensor Networks
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Detection of Malicious URLs using Classification Algorithm
Muskan V. Jaiswal, Dr. Anjali B. Raut