Case Studies of Security in Cloud Computing
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : S.Kavya, G.S.Raghavendra|
|DOI : 10.14445/22312803/IJCTT-V51P110|
S.Kavya, G.S.Raghavendra "Case Studies of Security in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V51(1):64-67, September 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want and need to have both onsite and offsite IT environments. Most cloud offerings, though, are only designed to run new applications, not support older legacy ones. This paper briefly outlines different aspects which are helpful for fast computing and major factors that dominate the future computing world and also describes about innovation cycle in IT Sector.
 NESSI–Cloud White Paper A Software & Service Perspective on the Future of Cloud in Europe.
 Lutz Schubert, Keith Jeffery,” Advances in Clouds Research in Future Cloud Computing.”
 Ted samson,” 9 top threats to cloud computing security”
 Brooks, C “How to build an application for the Cloud. Search Cloud Computing. Available online”
 G.Stuer, K.Vanmechelena, J.Broeckhovea,”Acommodity market, Future Generation Computer Systems “
 Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
innovation cycle; cloud; services; servicification; Dos.