Cloud Computing: Different Approach & Security Challenge
Maneesha Sharma1, Himani Bansal2, Amit Kumar Sharma3
1Ms. Maneesha Sharma# **student, Amity School of Engineering and TechnologyAmity University, Noida, UP.
2Ms. Himani Bansal*#Assist Prof, Department of Information Technology Dronacharya College of Engineering, Gr. Noida.
3Mr. Amit Kumar Sharma**Assoc. Prof, Department of Information TechnologyDronacharya College of Engineering, Gr.Noida
Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 421-424 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0469022112/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud computing has generated a lot of interest and competition in the industry and it is recognize as one of the top 10 technologies of 2010. It is an internet based service delivery model which provides internet based services, computing and storage for users in all market including financial, health care & government. In this paper we did systematic review on different types of clouds and the security challenges that should be solved. Cloud security is becoming a key differentiator and competitive edge between cloud providers. This paper discusses the security issues arising in different type of clouds.
Keywords: Cloud, Security, Security challenges, Cloud computing