Analysis of security threats and vulnerabilities in Cloud Computing

Authors

  • Mr. S. Mohammed Ibrahim, Dr. R. Balusamy, Dr.C. Sivakumar, Ms. K.Sakthi, Ms.J.Ayisha Siddhika. Ms.R. Vanitha

Keywords:

elasticity, ubiquity, scalability,resource availability,Cloud Computing, security.

Abstract

Cloud computing was not a new technology; rather, it represents a progression of IT design from centralised computing to network-dependent systems with distributed assets and administrative responsibilities. It is well-known for its pay-per-use payment approach, as
well as other benefits such as elasticity, ubiquity, scalability, and resource availability for enterprises

References

K. Ashton, “That ‘Internet of Things’ thing - RFID Journal,” RFID J., vol. 22, no. 7,pp. 97–114, 2009.

Z. Pang, et al., “Design of a terminal solution for integration of in-home health caredevices and services towards the Internet-of-Things,” Enterp. Inf. Syst., vol. 9, no. 1, pp.86–116, 2015.

G. Broil, M. Paolucci, M. Wagner, E. Rukzio, A. Schmidt, and H. Hußmann, “Perci:Pervasive service interaction with the internet of things,” IEEE Internet Comput., vol. 13,no. 6, pp. 74–81, 2009.

Downloads

Published

2024-01-14

How to Cite

Mr. S. Mohammed Ibrahim, Dr. R. Balusamy, Dr.C. Sivakumar, Ms. K.Sakthi, Ms.J.Ayisha Siddhika. Ms.R. Vanitha. (2024). Analysis of security threats and vulnerabilities in Cloud Computing . Journal of Computational Analysis and Applications (JoCAAA), 33(1A), 539–549. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/2237

Issue

Section

Articles

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.