We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Threats to Virtual Network Security

Published on April 2012 by Pratishtha
Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
Foundation of Computer Science USA
DRISTI - Number 1
April 2012
Authors: Pratishtha
6e634c86-c5ac-4c69-af79-eb521f5b01da

Pratishtha . Threats to Virtual Network Security. Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012). DRISTI, 1 (April 2012), 16-19.

@article{
author = { Pratishtha },
title = { Threats to Virtual Network Security },
journal = { Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012) },
issue_date = { April 2012 },
volume = { DRISTI },
number = { 1 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/dristi/number1/5924-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
%A Pratishtha
%T Threats to Virtual Network Security
%J Development of Reliable Information Systems, Techniques and Related Issues (DRISTI 2012)
%@ 0975-8887
%V DRISTI
%N 1
%P 16-19
%D 2012
%I International Journal of Computer Applications
Abstract

Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Current drift of organizations is moving toward the technology "Cloud Computing". Cloud Computing directly refers to the virtual organizations. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. Since, many local intrusion detection & audit practices are taking place; our virtual organization is under these threats. Privacy concern of information about each member between organization & member keeps the information private & centralized. With its innovative features, it raises the question of trust, privacy & security. In this paper I would try to identify threats to security in cloud computing and how these threats can be dealt with. Moreover we will also discuss the latest solutions available and their relative advantages and drawbacks.

References
  1. KIT Software Quality Department "Defining and Measuring Cloud Elasticity".
  2. Cloud Slam 2011 "Economies of Cloud Scale Infrastructure".
  3. CloudAve "Recession is good for Cloud Computing Microsoft Agrees".
  4. IDC "Defining 'Cloud Services' and 'Cloud Computing'"
  5. King, Rachael: Businessweek "Cloud Computing: Small companies take flight.
  6. National Institute of Science and Technology, "The NIST Definition of Cloud Computing"
  7. Techno-pulse "Cloud Computing for the beginners"
  8. Jinesh Varia "Amazon web-services- Cloud Architectures"
  9. Deloitte, "Cloud Computing"
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Privacy Confidentiality Virtual Network Reliability Cost