Cloud Computing: Different Approach & Security Challenge
Maneesha Sharma1, Himani Bansal2, Amit Kumar Sharma3

1Ms. Maneesha Sharma# **student, Amity School of Engineering and TechnologyAmity University, Noida, UP.
2Ms. Himani Bansal*#Assist Prof, Department of Information Technology Dronacharya College of Engineering, Gr. Noida.
3Mr. Amit Kumar Sharma**Assoc. Prof, Department of Information TechnologyDronacharya College of Engineering, Gr.Noida 

Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 421-424 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0469022112/2012©BEIESP
Open Access | Ethics and Policies | Cite 
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing has generated a lot of interest and competition in the industry and it is recognize as one of the top 10 technologies of 2010[1]. It is an internet based service delivery model which provides internet based services, computing and storage for users in all market including financial, health care & government. In this paper we did systematic review on different types of clouds and the security challenges that should be solved. Cloud security is becoming a key differentiator and competitive edge between cloud providers. This paper discusses the security issues arising in different type of clouds.

Keywords: Cloud, Security, Security challenges, Cloud computing