International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 29    Submit Your Rating     Cite This   Download        Certificate

AN ANALYSIS OF THREATS AND CHALLENGES OF CLOUD COMPUTING

    1 Author(s):  SAMAYRA

Vol -  6, Issue- 3 ,         Page(s) : 95 - 101  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Cloud computing is a very important revolution in IT sector. Every company/individual have big data (information) and it`s hard to carry it along with them, that`s why cloud computing came in light .Cloud computing is nothing but internet computing (internet is a hub of data that`s why we call it cloud). It provides safe, ease and fast way to store data .Gartner (Jay Heiser, 2009) defines cloud computing (Stanojevi et al., 2008;Vaquero et al., 2009; Weiss, 2007; Whyman, 2008; Boss et al., 2009) as ‘‘a style of computing where massively scalable IT enabled capabilities are delivered ‘as a service’ to external customers using Internet technologies’’.Now you can save your data on internet and easily access it from anywhere anytime. Now-a-days so many companies are providing cloud storage for your data/application or anything at very small price. The convenience and low cost of cloud computing services have changed our daily lives. It is providing so many benefits to the users but the problem is "is it safe?" for a company/individual to save or store data to cloud because it is in someone else premises and user is fetching it remotely.

1. Ken Presti, “Halfway Approach to Cloud Security Leaves Huge Channel Play”, May 03, 2013, pp.1, http://www.crn.com/news/cloud/240154180/halfway-approach-to-cloud-security-leaves-huge-channel-play.htm. [Accessed: 20-Jun-2013] 
2. Alistair Barr, “Data mining puts cloud security back on agenda”, Jun 19, 2013, http://www.reuters.com/article/2013/06/20/us-summit-cloud-idUSBRE95J01720130620. [Accessed: 22-Jun- 2013] 
3. Rajesh Piplode, Umesh Kumar Singh, “An Overview and Study of Security Issues & Challenges in Cloud Computing”, IJARCSSE, Vol. 2, Issue 9, September 2012, pp.115
4. CSA, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1”, Cloud Security Alliance, 2009, [Accessed: 22-Jun-2013] https://Cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. 
5. “Cloud computing: A new era of IT opportunity and challenges”. ZDNet. March 3rd, 2009. pp.261, [Accessed: 23-Jun-2013], http://blogs.zdnet.com/Hinchcliffe/? 
6. Minqi Z; Rong Z; Wei X; Weining Q; Aoying Z, “Security and Privacy in Cloud Computing: A Survey”, Sixth international conference on Semantics Knowledge and Grid (SKG), Nov. 1-3 ,2010, pp. 105.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details