DocumentCode :
2144762
Title :
A New Technique of Data Integrity for Analysis of the Cloud Computing Security
Author :
Chalse, Rajkumar ; Selokar, Ashwin ; Katara, Arun
fYear :
2013
fDate :
27-29 Sept. 2013
Firstpage :
469
Lastpage :
473
Abstract :
Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client´s data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client´s data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.
Keywords :
cloud computing; data integrity; open systems; security of data; software architecture; business model; cloud computing security analysis; data integrity technique; high interoperability; information technology resources; multiple service provider; open architecture; open interface; single service provider; Cloud computing; Computational modeling; Memory; Protocols; Security; Servers; Cloud security; IaaS; PaaS; SaaS; data storage; integrity verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on
Conference_Location :
Mathura
Type :
conf
DOI :
10.1109/CICN.2013.103
Filename :
6658038
Link To Document :
بازگشت