Analysis of security threats and vulnerabilities in Cloud Computing
Keywords:
elasticity, ubiquity, scalability,resource availability,Cloud Computing, security.Abstract
Cloud computing was not a new technology; rather, it represents a progression of IT design from centralised computing to network-dependent systems with distributed assets and administrative responsibilities. It is well-known for its pay-per-use payment approach, as
well as other benefits such as elasticity, ubiquity, scalability, and resource availability for enterprises
References
K. Ashton, “That ‘Internet of Things’ thing - RFID Journal,” RFID J., vol. 22, no. 7,pp. 97–114, 2009.
Z. Pang, et al., “Design of a terminal solution for integration of in-home health caredevices and services towards the Internet-of-Things,” Enterp. Inf. Syst., vol. 9, no. 1, pp.86–116, 2015.
G. Broil, M. Paolucci, M. Wagner, E. Rukzio, A. Schmidt, and H. Hußmann, “Perci:Pervasive service interaction with the internet of things,” IEEE Internet Comput., vol. 13,no. 6, pp. 74–81, 2009.