Date of Publication :7th September 2016
Abstract: the theme underneath this paper is based on a survey of cloud computing, the way how it is, the way how it can be and finally, the way how it should be. Cloud computing is one of the fastest growing computer and network related sectors whose usage can cause much benefit .It totally depends on internet to deliver its services to the users. It also includes security, privacy, and internet dependency and availability as avoidance issues. This paper puts forth some of the suggestions that may arise in future for a more secured environment of cloud computing resources.
Reference :
-
- Thomas Erl , Cloud Computing: Concepts, Technology & Architecture, Published May 2013
- Michael J. Kavis , Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, & IaaS), Published January 2014
- Raghuram Yeluri, Building the Infrastructure for Cloud Security, Published March 2014
- Hongwei Li, Yuanshun Dai, Ling Tian, and Haomiao Yang, Identity-Based Authentication for Cloud Computing
- Sudhansu Ranjan Lenka, Biswaranjan Nayak , Enhancing Data Security in Cloud Computing Using RSA Encryption andMD5 Algorithm, Trident Academy of Technology.
- Suruchee V.Nandgaonkar, Prof. A. B. Raut, A Comprehensive Study on Cloud Computing
- M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, On Technical Security Issues in Cloud Computing. IEEE, 2009