Security Issues and Data Management In Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-3                          
Year of Publication : 2013
Authors : T.P.Sarachandrika, Dasari Kiran Kumar,P.Jayasankar,B. Sunil Kumar   

Citation

- T.P.Sarachandrika, Dasari Kiran Kumar,P.Jayasankar,B. Sunil Kumar    "Security Issues and Data Management In Cloud Computing" . International Journal of Computer & organization Trends (IJCOT), V3(3):19-25 May - Jun 2013, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

Cloud computing placed IT to higher and new limits by providing the market environment data storage and capacity with flexible and scalable and processing power to reach the demand and supply while reducing the capital expenditure .The cost of the successful implementation of the cloud computing is to efficiently manage the security in the cloud computing applications. Security awareness and anxiety arises as soon as application starts running over the officially assigned firewall and move closer towards the public domain. The main purpose of the paper is to provide an overall security view of cloud computing. The main aim is to highlight the security concerns that should properly addresses and managed to realize the full feasible of cloud computing. Some important issues like Gartner’s list on cloud security and cloud threats will be discussed in this paper.

References

[1].Gens F, 2009,’ New IDC IT Cloud Services Survey: Top Benefits and Challenges’, IDC exchange, viewed 18 February 2010, from <http://blogs.idc.com/ie/?p=730>.
[2]. Leavitt N, 2009, ‘Is Cloud Computing Really Ready for Prime Time?’,Computer, Vol. 42, pp. 15-20, 2009.
[3]. Weinhardt C, Anandasivam A, Blau B, and Stosser J, ‘Business Models in the Service World’, IT Professional, vol. 11, pp. 28-33, 2009.
[4]. Josh Ames blog.appcore.com/blog/bid/167543/Types-of-Cloud-Computing-Private-Public-and-Hybrid-Clouds in 2012.
[5]. A Platform Computing Whitepaper, ‘Enterprise Cloud Computing: Transforming IT’, Platform Computing, pp6, viewed 13 March 2010.
[6]. Dooley B, 2010, ‘Architectural Requirements Of The Hybrid Cloud’, Information Management Online, viewed 10 February 2010, from <http://www.information-management.com/news/hybrid-cloudarchitectural- requirements-10017152-1.html>.
[7] Global NetoptexIncorporated , 2009, Demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13 December 2009.
[8]. The basics of cloud computing by AlexaHuth and James Cebula.
[9].searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS.
[10].searchcloudcomputing.techtarget.com/definition/Software-as-a-Service-SaaS.
[11].searchcloudcomputing.techtarget.com/definition/Infrastructure-as-a-Service-IaaS.
[12]. Brodkin J, 2008, ‘Gartner: Seven cloud-computing security risks’, Infoworld, viewed 13 March 2009, from www.infoworld.com/d/security-central/gartner-seven-cloudcomputing- security-risks-853?page=0,1.
[13] ISO. ISO 7498-2:1989. Information processing systems- Open Systems Interconnection.
[14].Dropbox www.dropbox.com,2011.1..
[15] “Cloud computing and outsourcing data safety analysis and suggestionshttp://datacenter.ctocio.com.cn/Cloud%20Computing/249/8990749.shtml,2009.7.
[16] “Amazon Simple Storage Service,” http://aws.amazon.com/s3 2011.1.
[17] HBase, http://hbase.apache.org/,2011.1.

Keywords

Cloud computing, security, hybrid cloud, public cloud, private cloud.