📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 4, ISSUE 10, OCTOBER 2015

Study of Threats and Security in Cloud Computing Technology

Vinayak D. Shinde, Anas Dange, Muhib Anwar Lambay

DOI: 10.17148/IJARCCE.2015.41008

Abstract: Cloud computing plays a vital role in the service of internet by providing the facility of virtually infinite computing resources on-demand and eliminating the need of hardware and software infrastructure. The advantages of virtualizing applications are eminent: minimizing the cost of hardware, reducing the need to buy software license, decreasing the implementation cost as client pays only for what is needed and globalizing the workforce which improves the accessibility there by increasing the efficiency. This support has led to the evolution of many new cloud initiatives, ranging from private clouds to the well-known publicly accessible clouds such as Google, Amazon, etc. Cloud computing is not just of what computing service is delivered but how it is being delivered is equally important. In spite of its indispensable benefits, there are certain critical challenges that need to be taken care of before going in for this technology. On one hand, the untrusted cloud servers are not entitled to access the outsourced data content for data secrecy, and on the other hand, the data resources are not physically under the full control of data owner. In this paper, we analyse the various security threats and vulnerabilities involved in cloud computing which will help us to upgrade the benefits of cloud computing. Finally, this paper discusses some solutions to secure the information of an enterprise for cloud computing deployment.



Keywords: cloud computing, virtualization, service of internet, security threats.

How to Cite:

[1] Vinayak D. Shinde, Anas Dange, Muhib Anwar Lambay, “Study of Threats and Security in Cloud Computing Technology,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.41008