Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Research Challenges for Adoption of Cloud Environment
Nitin Nagar
Cloud computing is one of the important research aspects of distributed computing in the emergence of information technology. Cloud computing refers to services, applications, and data storage delivered online through powerful file servers. Deployment of cloud computing depends on whether the cloud is a private, community, public, or hybrid one. Private clouds are operated for a particular organization, whereas community clouds are mutual by a number of organizations. Public clouds are available to the common public or large groups of Industries, while hybrid clouds combine public and private elements in the same data center. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.
Keywords: VM, Cloud Computing, Kerbores, Authentication, Authorization, Security
Edition: Volume 4 Issue 7, July 2015
Pages: 160 - 162
How to Cite this Article?
Nitin Nagar, "Research Challenges for Adoption of Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156339, Volume 4 Issue 7, July 2015, 160 - 162
100 PDF Views | 89 PDF Downloads
Similar Articles with Keyword 'VM'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 627 - 632LoG Feature Extraction Based Photographic Detection
Sujitha B Cherkottu, Smija Das
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1690 - 1694Analytics of Application Resource Utilization within the Virtual Machine
Priyanka H
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3173 - 3178An Overview of Pattern Recognition Applications and Its Approaches: A Review
Rajleen Kaur
Similar Articles with Keyword 'Cloud Computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'Authorization'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1724 - 1727Privacy Preserving Authenticity Framework for Shared Data Cloud Network
P. Vanitha Sree, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1258 - 1261Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud
P. Narasimhulu, Jayavarthini.C
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Similar Articles with Keyword 'Security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin