International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 51 | Number 1 | Year 2017 | Article Id. IJCTT-V51P110 | DOI : https://doi.org/10.14445/22312803/IJCTT-V51P110

Case Studies of Security in Cloud Computing


S.Kavya, G.S.Raghavendra

Citation :

S.Kavya, G.S.Raghavendra, "Case Studies of Security in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 51, no. 1, pp. 64-67, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V51P110

Abstract

Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want and need to have both onsite and offsite IT environments. Most cloud offerings, though, are only designed to run new applications, not support older legacy ones. This paper briefly outlines different aspects which are helpful for fast computing and major factors that dominate the future computing world and also describes about innovation cycle in IT Sector.

Keywords

innovation cycle; cloud; services; servicification; Dos.

References

[1] NESSI–Cloud White Paper A Software & Service Perspective on the Future of Cloud in Europe.
[2] Lutz Schubert, Keith Jeffery,” Advances in Clouds Research in Future Cloud Computing.”
[3] Ted samson,” 9 top threats to cloud computing security”
[4] Brooks, C “How to build an application for the Cloud. Search Cloud Computing. Available online”
[5] G.Stuer, K.Vanmechelena, J.Broeckhovea,”Acommodity market, Future Generation Computer Systems “
[6] Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf