000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20191016145441.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
191016b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
9890 |
Author |
Stefan Henry |
245 ## - TITLE STATEMENT |
Title |
Cloud Computing Security Threats and Solutions |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.4(2), July-Dec |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Tamil Nadu |
Name of publisher, distributor, etc. |
i-manager's |
Year |
2017 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
1-8p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The continued evolution of technology has led to a vast virtualized network of unlimited possibilities; cloud computing. Cloud computing is an internet based service that offers cloud storage, online storage, to clients. With the use of software applications, providers create an end user virtual application that provides the user with software resources along with the necessary hardware components needed to keep all data secured. Clients are given the choice of three service models when purchasing cloud service; Software as a Service, Platform as a Service, and Infrastructure as a Service. In all cloud servers, there are four different deployment models of cloud systems; the public cloud, private cloud, the hybrid cloud and the community cloud. When it comes to the use of cloud systems, even though there are large amount of advantages there are equally a large amount of serious risks that if left unchecked, could lead to serious implications to the user’s data and the provider’s cloud service. Because of the complexity of cloud computing, developing quality security measures is highly challenging. This paper provides a background on what cloud computing is; it dives into details of the service models, the deployment models, what the threats and risks are. This paper also offers notable solutions to combat the increasing threats against cloud systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4622 |
Topical term or geographic name entry element |
Computer Engineering |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
9891 |
Co-Author |
Md Liakat Ali |
773 0# - HOST ITEM ENTRY |
International Standard Serial Number |
2349-6835 |
Place, publisher, and date of publication |
Nagercoil i-manager Publication |
Title |
i-manager's journal on cloud computing (JCC) |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
https://www.imanagerpublications.com/viewarticles/23/813/JCCVol4Iss2 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |