(3.22.217.51)
Users online: 11820     
Ijournet
Email id
 

International Journal of Advanced Research in Engineering and Applied Sciences
Year : 2014, Volume : 3, Issue : 1
First page : ( 1) Last page : ( 10)
Online ISSN : 2278-6244.

Analysis of security threats and prevention in cloud storage: review report

Kuppuswamy Prakash*, Al-Khalidi Saeed Q Y**

*Lecturer, Computer Engineering & Networks Department, Jazan University, KSA

**Dean, Deanship of Libraries Affairs, King Khalid University, KSA

Online published on 7 June, 2014.

Abstract

The term "cloud" is used as a representation of the Internet and other communications systems as well as an abstraction of the underlying infrastructures involved. It is a model for enabling global, convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing is a disruptive technology that has the potential to enhance collaboration, agility, scaling and availability and provides the opportunities for cost reduction through optimized and efficient computing. Data resting in the cloud needs to be accessible only by those authorized to do so, making it critical to both restrict and monitor who will be accessing the company's data through the cloud. In order to ensure the integrity of user authentication, companies need to be able to view data access logs and audit trails to verify that only authorized users are accessing the data. This paper discussed about security threats and prevention methodology of cloud computing storage.

Top

Keywords

Cloud storage, Cloud security, Cloud threats, Malicious attacker etc.

Top

 
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
750,489,767 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.