Full Paper View Go Back

Study of Services and Privacy Usage in Cloud Computing

Rakesh Prasad Sarang1 , Rajesh Kumar Bunkar2

Section:Review Paper, Product Type: Isroset-Journal
Vol.1 , Issue.6 , pp.7-12, Nov-2013


Online published on Dec 31, 2013


Copyright © Rakesh Prasad Sarang , Rajesh Kumar Bunkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rakesh Prasad Sarang , Rajesh Kumar Bunkar, “Study of Services and Privacy Usage in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.

MLA Style Citation: Rakesh Prasad Sarang , Rajesh Kumar Bunkar "Study of Services and Privacy Usage in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.6 (2013): 7-12.

APA Style Citation: Rakesh Prasad Sarang , Rajesh Kumar Bunkar, (2013). Study of Services and Privacy Usage in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(6), 7-12.

BibTex Style Citation:
@article{Sarang_2013,
author = {Rakesh Prasad Sarang , Rajesh Kumar Bunkar},
title = {Study of Services and Privacy Usage in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {11 2013},
volume = {1},
Issue = {6},
month = {11},
year = {2013},
issn = {2347-2693},
pages = {7-12},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=104},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=104
TI - Study of Services and Privacy Usage in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Rakesh Prasad Sarang , Rajesh Kumar Bunkar
PY - 2013
DA - 2013/12/31
PB - IJCSE, Indore, INDIA
SP - 7-12
IS - 6
VL - 1
SN - 2347-2693
ER -

4388 Views    4229 Downloads    4173 Downloads
  
  

Abstract :
In last decade, there are several survey point out over privacy and services has risen and increasingly becoming central point for IT industries. Almost every day, IT sector, network security and sensitive data are being broken. This uses more advanced techniques to protect their information. Privacy is a very essential issue for cloud computing. Hence there is a need of an effective privacy and security that protect data, information and technology resources adequately. This survey focus on cloud computing, its architecture, services and identifies the cloud computing privacy. In this paper, we are presenting a service models to deal with the privacy and security problems in cloud computing environment. We elaborate privacy and service models as considered in cloud computing resources and the proper preventing their data. There are multifarious security and privacy that need to be understood. The paper includes some privacy and techniques that show the motivation for the adoption of cloud computing.

Key-Words / Index Term :
Cloud Computing,Service Models, Vulnerability Privacy and Cloud Usage

References :
Rao, Srinivasa, and V Nageswara Rao, “Cloud Computing: an Overview”, (JATIT) Journal of Theoretical and Applied Information Technology, 71-76, 2009.
[2] Khorshed, Tanzim, A B M Shawkat Ali, and Saleh A Wasimi, “A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing”, Future Generation Computer Systems, 833-851, 2012.
[3] Ruiter, Joep, and Martijn Warnier, “Privacy Regulations for Cloud Computing”, 1-16.
[4] Sun D, Chang G, Sun L, Wang X, “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud computing Environment”, Elsevier Procedia Engineering, 2852-2856, 2011.
[5] Metri, Priya, Sarote, Geeta,”Privacy Issues and Challenges in Cloud Computing”, (IJAEST) International Journal of Advanced Engineering Sciences and Technologies, vol. 5, 1-6, 2011.
[6] Sultan, Nabil, “Cloud Computing for Education: A New Dawn”, (IJIM) International Journal of Information Management, 30 109-116, 2010.
[7] San Francisco, CA Chappell and Associates Chappell, D. A. “Short introduction to Cloud platforms: An Enterprise-Oriented view”, Aug. 2008.
[8] Bhadauria, Rohit, Chaki, Rituparna, Nabendu, Sanyal, Sugata, “A Survey on Security Issues in Cloud Computing”, Electronics and Communications.
[9] Jens, F. Jones, M. T. “Cloud computing with Linux Defining Cloud services and cloud computing”, Sept. 2008.
[10] Scalable Security Solutions, Check Point Open Performance Architecture, Quad Core Intel Xeon Processors, “Delivering Application-Level Security at Data Centre Performance Levels”, IntelCorporation,2008.http://download.intel.com/netcomms/technologies/security.
[11] Kumar, Pardeep, Sehgal, Vivek, Chauhan, Durg, Singh, Gupta, P K, and Diwakar, Manoj “Effective Ways of Secure, Private and Trusted Cloud Computing”, (IJCSI) International Journal of Computer Science Issues, vol.8, 412-421, May. 2011.
[12] Jansen, Wayne A, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, 44th Hawaii International Conference on System Sciences, 1-10, Oct. 2011.
[13] Alvi, F. A., Choudary, B. S., & Jaferry, N., “A review on cloud computing security issues & challenges”.
[14] Ercan, T., “Effective use of cloud computing in educational institutions”, Sciences-New York, 2, 938-942.sbspro, 130, 2010.
[15] Open Grid Forum. “Cloud Storage for Cloud Computing Storage Networking Industry Association”, http://www.snia.org/cloud/ Cloud Storage for Cloud Computing, 2009.
[16] Mircea, M., “Addressing Data Security in the Cloud”, Intelligence World Academy of Science, Engineering and Technology 6, 539-546, 2012.
[17] S. Jordan, and A. Bruno, “CCDA 640-864 Official Cert Guide, 4th Edition”, Indianapolis: Cisco Press. 2011.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation