R. Bhadauria, R. Chaki, N. Chaki, und S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.
Zusammenfassung
Cloud Computing holds the potential to eliminate the requirements for setting
up of high-cost computing infrastructure for the IT-based solutions and
services that the industry uses. It promises to provide a flexible IT
architecture, accessible through internet for lightweight portable devices.
This would allow many-fold increase in the capacity or capabilities of the
existing and new software. In a cloud computing environment, the entire data
reside over a set of networked resources, enabling the data to be accessed
through virtual machines. Since these data centers may lie in any corner of the
world beyond the reach and control of users, there are multifarious security
and privacy challenges that need to be understood and taken care of. Also, one
can never deny the possibility of a server breakdown that has been witnessed,
rather quite often in the recent times. There are various issues that need to
be dealt with respect to security and privacy in a cloud computing scenario.
This extensive survey paper aims to elaborate and analyze the numerous
unresolved issues threatening the Cloud computing adoption and diffusion
affecting the various stake-holders linked to it.
Beschreibung
[1109.5388] A Survey on Security Issues in Cloud Computing
%0 Generic
%1 Bhadauria2011
%A Bhadauria, Rohit
%A Chaki, Rituparna
%A Chaki, Nabendu
%A Sanyal, Sugata
%D 2011
%K electronic employee personalization privacy survey
%T A Survey on Security Issues in Cloud Computing
%U http://arxiv.org/abs/1109.5388
%X Cloud Computing holds the potential to eliminate the requirements for setting
up of high-cost computing infrastructure for the IT-based solutions and
services that the industry uses. It promises to provide a flexible IT
architecture, accessible through internet for lightweight portable devices.
This would allow many-fold increase in the capacity or capabilities of the
existing and new software. In a cloud computing environment, the entire data
reside over a set of networked resources, enabling the data to be accessed
through virtual machines. Since these data centers may lie in any corner of the
world beyond the reach and control of users, there are multifarious security
and privacy challenges that need to be understood and taken care of. Also, one
can never deny the possibility of a server breakdown that has been witnessed,
rather quite often in the recent times. There are various issues that need to
be dealt with respect to security and privacy in a cloud computing scenario.
This extensive survey paper aims to elaborate and analyze the numerous
unresolved issues threatening the Cloud computing adoption and diffusion
affecting the various stake-holders linked to it.
@misc{Bhadauria2011,
abstract = { Cloud Computing holds the potential to eliminate the requirements for setting
up of high-cost computing infrastructure for the IT-based solutions and
services that the industry uses. It promises to provide a flexible IT
architecture, accessible through internet for lightweight portable devices.
This would allow many-fold increase in the capacity or capabilities of the
existing and new software. In a cloud computing environment, the entire data
reside over a set of networked resources, enabling the data to be accessed
through virtual machines. Since these data centers may lie in any corner of the
world beyond the reach and control of users, there are multifarious security
and privacy challenges that need to be understood and taken care of. Also, one
can never deny the possibility of a server breakdown that has been witnessed,
rather quite often in the recent times. There are various issues that need to
be dealt with respect to security and privacy in a cloud computing scenario.
This extensive survey paper aims to elaborate and analyze the numerous
unresolved issues threatening the Cloud computing adoption and diffusion
affecting the various stake-holders linked to it.
},
added-at = {2011-11-12T19:20:06.000+0100},
author = {Bhadauria, Rohit and Chaki, Rituparna and Chaki, Nabendu and Sanyal, Sugata},
biburl = {https://www.bibsonomy.org/bibtex/2ace3e17fbcf0af4cda343664736d4876/gizmoguy},
description = {[1109.5388] A Survey on Security Issues in Cloud Computing},
interhash = {dbed1b50c8113e315db326def151dece},
intrahash = {ace3e17fbcf0af4cda343664736d4876},
keywords = {electronic employee personalization privacy survey},
note = {cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials},
timestamp = {2011-11-12T19:20:06.000+0100},
title = {A Survey on Security Issues in Cloud Computing},
url = {http://arxiv.org/abs/1109.5388},
year = 2011
}