CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Overcoming network security issues in cloud computing and its applications (A major challenge in cloud computing applications)

Published on June 2012 by Naveen Sharma, Dimple Malik, Mahesh Kr. Saini
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 14
June 2012
Authors: Naveen Sharma, Dimple Malik, Mahesh Kr. Saini
5296c00a-e063-4b0c-a82b-e5b9b2807594

Naveen Sharma, Dimple Malik, Mahesh Kr. Saini . Overcoming network security issues in cloud computing and its applications (A major challenge in cloud computing applications). National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 14 (June 2012), 9-11.

@article{
author = { Naveen Sharma, Dimple Malik, Mahesh Kr. Saini },
title = { Overcoming network security issues in cloud computing and its applications (A major challenge in cloud computing applications) },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { June 2012 },
volume = { RTMC },
number = { 14 },
month = { June },
year = { 2012 },
issn = 0975-8887,
pages = { 9-11 },
numpages = 3,
url = { /proceedings/rtmc/number14/7134-1067/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Naveen Sharma
%A Dimple Malik
%A Mahesh Kr. Saini
%T Overcoming network security issues in cloud computing and its applications (A major challenge in cloud computing applications)
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 14
%P 9-11
%D 2012
%I International Journal of Computer Applications
Abstract

In this modern technologies world everything becomes very vast and more reliable . We makes our documentation on one pc and we can access and get this on other system but this can be happened with the help of internet. The rapid improvement of the capacity of online connectivity gave birth to cloud computing. Data and processes could be done online without the need of any local software or client. As long as the user knows the process and has the right security credentials, he could access the system and make the necessary changes, but there are major challenges and security issues in cloud computing that makes accessing somewhat difficult. In this paper we are giving a introduction to cloud computing and discussing and overcome this security issues that being coming in cloud computing applications.

References
  1. http://blog. animoto. com/2008/04/21/amazon-ceo-jeff-bezos-onanimoto/
  2. searchcloudcomputing. techtarget. com/definition/cloud-computing
  3. www. infoworld. com/. . . /cloud-computing/what-cloud-computing
  4. "Let it rise – A special report on corporate IT", The Economist, October 25th, 2008
  5. Jeff Cogswell, "RightScale eases developing on Amazon EC2" eweek. com, October 21st, 2008
  6. Peter Wayner, "Cloud versus cloud – A guided tour of Amazon, Google, AppNexus and GoGrid", InfoWorld, July 21, 2008
  7. James Staten, "Is Cloud Computing Ready for the Enterprise?" Forrester Report, March 7, 2009,
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Network Security Cloud Computing Applications