Gnanavelu et al., 2014 - Google Patents
Survey on Security Issues and Solutions in Cloud ComputingGnanavelu et al., 2014
View PDF- Document ID
- 12887156572408909470
- Author
- Gnanavelu D
- Gunasekaran D
- Publication year
- Publication venue
- Int. J. Comput. Trends Technol
External Links
Snippet
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Cloud computing weakness include list of issues …
- 206010016275 Fear 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Padhy et al. | Cloud computing: security issues and research challenges | |
Kumar | World of cloud computing & security | |
Kumar et al. | Assurance of data security and privacy in the cloud: A three-dimensional perspective | |
Sinanc et al. | A review on cloud security | |
Henze et al. | Moving privacy-sensitive services from public clouds to decentralized private clouds | |
Bhardwaj et al. | Review of solutions for securing end user data over cloud applications | |
Panth et al. | A survey on security mechanisms of leading cloud service providers | |
Gnanavelu et al. | Survey on Security Issues and Solutions in Cloud Computing | |
Balamurugan et al. | Cloud cluster communication for critical applications accessing C-MPICH | |
Banushri et al. | Hyperledger blockchain and lightweight bcrypt symmetric key encryption to boost cloud computing security effectiveness | |
Sharma et al. | Cloud computing risks and recommendations for security | |
Aggarwal et al. | Cloud computing: data storage security analysis and its challenges | |
Bobde et al. | An approach for securing data on Cloud using data slicing and cryptography | |
Thomas et al. | Cloud computing security using encryption technique | |
Kumar et al. | A Novel approach: Security measures and Concerns of Cloud Computing | |
Mohan et al. | Research in cloud computing-an overview | |
Walia | Security Vulnerability in Mobile Cloud Computing (MCC). | |
Dinesha et al. | Framework design of secure cloud transmission protocol | |
Kifayat et al. | Future security challenges in cloud computing | |
Zaher et al. | Secured Intrusion Detection in Adhoc Networks | |
Kaur et al. | A Blockchain Based Solution for Securing Data of IoT Devices | |
Paudyal et al. | Secure Data Mobility in Cloud Computing for e-Governance Application | |
Shah et al. | A concise study on issues related to security, privacy and trust in cloud services | |
Kouchay | Data Protection in Cloud Computing-vulnerabilities, challenges and Solution | |
Subhadra | An Analysis of Data Security and Privacy for Cloud Computing |