Cloud Computing Security Threats and Solutions (Record no. 9728)

000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191016145441.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191016b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 9890
Author Stefan Henry
245 ## - TITLE STATEMENT
Title Cloud Computing Security Threats and Solutions
250 ## - EDITION STATEMENT
Volume, Issue number Vol.4(2), July-Dec
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Tamil Nadu
Name of publisher, distributor, etc. i-manager's
Year 2017
300 ## - PHYSICAL DESCRIPTION
Pagination 1-8p.
520 ## - SUMMARY, ETC.
Summary, etc. The continued evolution of technology has led to a vast virtualized network of unlimited possibilities; cloud computing. Cloud computing is an internet based service that offers cloud storage, online storage, to clients. With the use of software applications, providers create an end user virtual application that provides the user with software resources along with the necessary hardware components needed to keep all data secured. Clients are given the choice of three service models when purchasing cloud service; Software as a Service, Platform as a Service, and Infrastructure as a Service. In all cloud servers, there are four different deployment models of cloud systems; the public cloud, private cloud, the hybrid cloud and the community cloud. When it comes to the use of cloud systems, even though there are large amount of advantages there are equally a large amount of serious risks that if left unchecked, could lead to serious implications to the user’s data and the provider’s cloud service. Because of the complexity of cloud computing, developing quality security measures is highly challenging. This paper provides a background on what cloud computing is; it dives into details of the service models, the deployment models, what the threats and risks are. This paper also offers notable solutions to combat the increasing threats against cloud systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 9891
Co-Author Md Liakat Ali
773 0# - HOST ITEM ENTRY
International Standard Serial Number 2349-6835
Place, publisher, and date of publication Nagercoil i-manager Publication
Title i-manager's journal on cloud computing (JCC)
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://www.imanagerpublications.com/viewarticles/23/813/JCCVol4Iss2
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Barcode Date last seen Price effective from Koha item type
          School of Engineering & Technology School of Engineering & Technology Archieval Section 2019-10-16 2019889 2019-10-16 2019-10-16 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha