ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 116-121

Keywords : Cloud Computing; Mobile Cloud Com puting; EBCDIC; Cloud Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

He Revolution has begun; time has come when we no more have to worry about the size, format & storage of data at a single pl ace. Cloud computing is a revolution which has made world of internet more like a place of dynamic storage & facilitator of new methodology, which generates tools for consumers in a very effective style of computations. Cloud Computing has made lots of cha nges not only in infrastructure side, but has also deeply impacted the software industry. Many Companies, Institutions are moving towards using Cloud computing technology, but with every new technology emerging in this Information technology world, with ma jor issues holds with security models to implement & problem like how we can keep data secured & safe. Cloud Computing; do pose various new security concerns, which have not been well identified & worked on. When we talk about the security of data in Cloud computing the vendor’s has to ensure assurance to get confidence of customer on the security issues. Institutions & organizations are planning to use cloud computing for certain level of confidential issues for their business applications though guarantee ing the security is difficult task for now. With most of companies & IT giants planning to incorporate usage of Mobile technology to enrich their existing services & w ith more & more advance smart phones available in market, we can think of certain ideas & solutions to use mobile devices as alert medium & help securing use of data & network in cloud environment to an extent? It can also help us to keep a watch on intruders & we can impose checks on illegal access to data & network. So we can think of using Mobile Technology with Cloud Networks. We in this paper, review certain security concerns in Cloud computing technology & also about certain ways to restrict & overcome such issues over SaaS & PaaS Layers using mobile technologies. In this paper we try to focus ourselves to find answers to all such questions & improvise the use of Mobile technology in complex but future cloud computing networks.

Last modified: 2014-11-28 21:48:38