A Systematic Review on Integrity and Security in Adoption of Cloud Computing Technologies

  • Authors

    • Ramesh Kumar Mojjad
    • Dr D.B.K.Kamesh
    • K B.K.S. Durga
    • N Sainath
    • A Kavitha
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.11677
  • Cloud services, Computing, cloud Models, Attacks, Technology, Security services, Models.
  • Distributed computing has waved the technological era in the year 2013 at a meeting in San Francisco, with sellers giving a lot of items and administrations that outfit IT which manages to convey request to cloud turmoil. Distributed computing pattern is expanding quickly for making the distributed computing well verse. The initial step for the association is to distinguish correct zone where the cloud issues exist. Surprisingly, the role of distributed computing has uplifted the era of business and government issues which lead to challenges towards security. The role of cloud technology improvements lead to display give business – supporting innovations in a proficient manner than any time in recent memory .the move from server to benefit based innovation got an intense change figuring innovation. However these improvements have made novel security challenges, including certain  issues whose  impact is a rising.[1] This paper displays a diagram and investigation of distributed computing, with a few security dangers, security issues, as of now utilized cloud innovations and security arrangements.

     

     

  • References

    1. [1] Juneja, Gurpreet K. "Use of Modeling Language to deploy applications in clouds." Dhiwar, Kamlesh Kumar. "Aspect of Cloud computing."

      [2] Akintomide, O. A. "Cloud computing: The third revolution in IT." Library Progress (International) 33.1 (2013): 77- 94.

      [3] Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft)." NIST special publication 800.145 (2011): 7.

      [4] Pearson, Siani, Yun Shen, and Miranda Mowbray. "A privacy manager for cloud computing." Cloud Computing. Springer Berlin Heidelberg, 2009. 90-106.

      [5] T OGRAPH, B., and Y. RICHARD MORGENS."Cloud computing."Communications of the ACM 51.7 (2008).

      [6] Velte, Toby, Anthony Volte, and Robert Elsenpeter. Cloud computing, a practical approach. McGraw-Hill, Inc., 2009.

  • Downloads

  • How to Cite

    Kumar Mojjad, R., D.B.K.Kamesh, D., B.K.S. Durga, K., Sainath, N., & Kavitha, A. (2018). A Systematic Review on Integrity and Security in Adoption of Cloud Computing Technologies. International Journal of Engineering & Technology, 7(2.7), 1017-1019. https://doi.org/10.14419/ijet.v7i2.7.11677