CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Security Problems Analysis Private Cloud Computing Vs. Public Cloud Computing in Giant Organizations

by Muhammad Imran Iftikhar, Abdul Aziz Ghazi, Muhammad Irfan Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 10
Year of Publication: 2018
Authors: Muhammad Imran Iftikhar, Abdul Aziz Ghazi, Muhammad Irfan Khan
10.5120/ijca2018916097

Muhammad Imran Iftikhar, Abdul Aziz Ghazi, Muhammad Irfan Khan . Security Problems Analysis Private Cloud Computing Vs. Public Cloud Computing in Giant Organizations. International Journal of Computer Applications. 179, 10 ( Jan 2018), 12-15. DOI=10.5120/ijca2018916097

@article{ 10.5120/ijca2018916097,
author = { Muhammad Imran Iftikhar, Abdul Aziz Ghazi, Muhammad Irfan Khan },
title = { Security Problems Analysis Private Cloud Computing Vs. Public Cloud Computing in Giant Organizations },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 179 },
number = { 10 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number10/28835-2018916097/ },
doi = { 10.5120/ijca2018916097 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:54:57.712089+05:30
%A Muhammad Imran Iftikhar
%A Abdul Aziz Ghazi
%A Muhammad Irfan Khan
%T Security Problems Analysis Private Cloud Computing Vs. Public Cloud Computing in Giant Organizations
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 10
%P 12-15
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is used to manage store and data processing using a remote servers instead of personal computer or local server. It is a general term that used to describe the delivery of hosted services over the internet. In cloud computing user cannot maintain and build their own computing infrastructures and use the computer resource like storage, virtual machine and application as a utility. From previous years, there is lot of advancement in cloud computing. Security of the user data is major issue and most crucial challenge in the cloud computing. Every organization demanded that privacy, integrity and security of data in each operation which is performed on the digital world. The security of the data is explained in the context of secure transformation of the data through the communication networks with cloud computing. For the security of the data from security threats and known attacks some common techniques are used on the database. The main purpose of usage of cloud computing is to make possible quick, secure and convenient data storage and sharing of computing resources on the internet. The aim of analysis is to identify threats and main vulnerabilities in cloud computing.

References
  1. Nelson Gonzalez, Charles Miers, Fernando Red´ıgolo, Marcos Simpl´ıcio, Tereza Carvalho,Mats N¨aslund and Makan PourzandiPg, “A quantitative analysis of current security concerns and solutions for cloud computing”, Journal of Cloud Computing: Advances, Systems and Applications, Springer,vol 1,issues 11,Pg no 1-18 2012.
  2. Greg Goth, “Mobile Security Issues Come to the Forefront”, 1089-7801, IEEE, published by the IEEE computer society, pg 7-9, 2012.
  3. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez, “An analysis of security issues for cloud computing”,Springer, Journal of Internet Services and Applications,vol 4,issues 5, Page 1- 13, 2013.
  4. Kuyoro S. O., Ibikunle F. & Awodele O, “Cloud Computing Security Issues and Challenges”,International Journal of Computer Networks (IJCN), Volume 3,Issue 5 , pg 247-255,2011.
  5. Elisa bertino, fellow, and ravi sandhu, “database security—concepts,approaches, and challenges” IEEE transactions on dependable and secure computing, vol. 2, no. 1, 1545-5971,pg 2-19,2005.
  6. Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker “Understanding Cloud Computing Vulnerabilities”, copublished by the ieee computer and reliability societies, 1540-7993, pg 50-57, 2011.
  7. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, “Security Issues for Cloud Computing”, 10.4018/jisp. 2010040103, International Journal of Information Security and Privacy,vol 4,issues 2,page no. 39-51, April-June 2010.EARCH
  8. John Harauz, Lori M. Kaufman, bruce Potter, “Data Security in the World of Cloud Computing”, IEEE ,1540-7993,copublished by the IEEE computer & reliability societies, Pg No 61-64, 2009.
  9. R Lakshman naik & s. S. V. N. Sarma,“A framework for mobile cloud computing”, international journal of computer networking, Wireless and mobile communications (ijcnwmc), Issn 2270-1768,Vol. 3, issue 1,Pg No. 1-12,2013.
  10. K.Sravani, K.L.A.Nivedita,“ Effective Service Security Schemes In Cloud Computing”,International Journal Of Computational Engineering Research ijcer Vol. 3,Issue 3,Issn 2250-3005, March 2013.
  11. https://en.wikipedia.org/wiki/Cloud_computing
  12. Amandeep, K. S. 2013. Analysis of Load Balancing Techniques in Cloud Computing. International Journal of Computers&Technology,4(3):124-143.
Index Terms

Computer Science
Information Sciences

Keywords

Vulnerabilities Threats Cloud Computing Security Issues Private Cloud Computing Public Cloud Computing.