National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering |
Foundation of Computer Science USA |
ACEWRM2015 - Number 1 |
May 2015 |
Authors: Arun Kumar Dewangan, Gurudatta Verma |
8db0bc54-1561-4507-bdcc-77ff923265e4 |
Arun Kumar Dewangan, Gurudatta Verma . A Security Method for Cloud Computing Threats. National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering. ACEWRM2015, 1 (May 2015), 26-28.
Cloud computing could be a platform for enhancing capabilities and developing potentialities at run time while not adopting new infrastructure, human resources, or software package systems. Also cloud computing originated from an enterprise idea, and developed into a successful IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of security is that the only major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information privacy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services must understand the dangers of uploading information into the new atmosphere. Therefore, in this paper we are proposing a different type of security technique for cloud computing threats so that all same problematic situations can be overcooked.