Study on Cloud Computing and Security Approaches
G. Murugaboopathi1, C.Chandravathy2, P. Vinoth Kumar3
1Dr. G. Murugaboopathi, Department of IT, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, India.
2C.Chandravathy, Department of IT, Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India.
3P. Vinoth Kumar, Department of IT, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai, India.
Manuscript received on February 03, 2013. | Revised Manuscript received on February 26, 2013. | Manuscript published on March 05, 2013. | PP: 212-215 | Volume-3 Issue-1, March 2013. | Retrieval Number: A1353033113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This paper highlights the basic concept of cloud computing and some of the security measures which have been taken into consideration till now. This paper also includes various ways which can be implemented for the betterment of cloud computing. With the recent advancement of technologies cloud computing has become a hotcake on which multiple organizations are working (e.g. Dell, IBM, Sun, Microsoft, Amazon etc.). It is out of reach for most of the organizations and/or individuals to purchase all the required hardware/software resources. So, using the resources available on the cloud one can perform required task by paying the applicable amount. But, always with popularity security issues come into picture and in this case security involves privacy and consistency of user data, durability of systems, protection from hacking and specially protection of contents which are vulnerable to potential threats. So, cloud computing must be launched with a strong security system so, that both service provider and user can be benefited.
Keywords: Cloud Computing, Security, Vulnerable, Threats, Resources.