Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Security Issues: Public vs Private vs Hybrid Cloud Computing

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 13
Year of Publication: 2012
R. Balasubramanian
M. Aramudhan

R Balasubramanian and M Aramudhan. Article: Security Issues: Public vs Private vs Hybrid Cloud Computing. International Journal of Computer Applications 55(13):35-41, October 2012. Full text available. BibTeX

	author = {R. Balasubramanian and M. Aramudhan},
	title = {Article: Security Issues: Public vs Private vs Hybrid Cloud Computing},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {13},
	pages = {35-41},
	month = {October},
	note = {Full text available}


Cloud computing appears as a new paradigm and its main objective is to provide secure, quick, convenient data storage and net computing service. Even though cloud computing effectively reduces the cost and maintenance of IT industry security issues plays a very important role. More and more IT companies are shifting to cloud based service like Private, Public and Hybrid cloud computing. But at the same time they are concerned about security issues. In this paper much attention is given to Public, Private and Hybrid cloud computing issues. , as more business today utilize cloud services and architectures more threats and concerns arise. An analysis of comparative benefits of different styles of cloud computing by using SPSS is also discussed here.


  • Gartner(2012) Cloud Computing . Retrived April 15,2012 from http://www. gartner. com/technology/it-glossary/cloud omputing. jsp
  • Rhoton,J. (2011). Common definition. Cloud Computing Explained: Second edition. Recursive Press, Us.
  • Grance,T. ,Mell,P. (2009) The NIST Definition of cloud computing. Retrieved march15, 2012 from http://www. nist. gov/itl/cloud/upload/cloud-def-v15. pdf
  • Ernst and Young (2011). In to the cloud, out of the fog. Retrieved April 13, 2012 from http://www. ey. com/GL/en/Services/Advisory/2011-Global-Information-Security-Survey-seeing-through-the-cloud
  • Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 10, October 2011pp 546-552and Search cloud computing. com E- Guide
  • SAS 70 (2012). Introduction to SAS 70 Type II Audit. Retrieved April 16, 2012 from http://www. sas70exam. com/services/type-ii- sas-70-audit/
  • Microsoft Corporation (2011) Addressing Cloud Computing Security Considerations. Retrieved April 2, 2012 from http://search. microsoft. com/en-us/results. aspx?form=MSHOME&setlang=en-us&q=Addressing%20Cloud%20Computing%20Security%20Considerations
  • www. trendmicro. com/cloud content/us/pdfs/business/white-papers/wp-hybrid -cloud-analysts-subramanian. pdf
  • www. security. com/content/hybrid-cloud-its-not-secure-you-think
  • http://it candor. net/2010/11/22 cloud-computing benefits-q410/