Review on “An analysis of the Management Security and Security Algorithms in Cloud Computing”
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)Publication Date: 2014-04-30
Authors : Nilesh N.Chawande Jayant P.Mehare;
Page : 110-120
Keywords : Cloud computing; Security; Public cloud; Private cloud;
- Extended Best Peer: A Peer-to-Peer Based System by Corporate Network for Data Sharing
- PEER-TO-PEER AD HOC NETWORK: AN OVERVIEW?
- A Super-Peer Coordination Scheme for Decentralized Peer-to-Peer Networking Using Mobile Agents
- Finding the highest performance for one-to-many content distribution in peer-to-peer networks based on the clustering and loading bandwidth of peer Nodes
- Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network
Abstract
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible & scalable computing as well as processing power to match elastic demand and supply while reducing capital use. However the opportunity cost of the successful implementation of cloud computing is to effectively manage the security in the cloud applications, due to constantly increase in the popularity of cloud computing there is an ever growing risk of security. Thus security is becoming a main and top issue for security concern. In this paper, we have analyzed the management security and various security algorithms in cloud computing.
Other Latest Articles
Last modified: 2014-04-06 21:46:53