Loading

A Study on Security Requirements in Different Cloud Frameworks
Ramandeep Kaur1, Pushpendra Kumar Pateriya2

1Ramandeep Kaur, Department of computer science and technology, Lovely Professional University, Jalandhar(Punjab), India.
2Pushpendra Kumar Pateriya, Department of computer science and technology, Lovely Professional University, Jalandhar (Punjab), India.
Manuscript received on February 04, 2013. | Revised Manuscript received on February 27, 2013. | Manuscript published on March 05, 2013. | PP: 133-136 | Volume-3 Issue-1, March 2013. | Retrieval Number: A1317033113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing provides the capability to use computing and other storage resources which are required by various users on a metered basis and reduce the expenditure in an organization’s computing infrastructure. The virtual machines running on physical hardware and being controlled by hypervisors is a cost-efficient and flexible computing technique that is used as a key technology in cloud computing and provides transparency to different cloud users as there is no actual physical allocation of the machine. As cloud computing provides various benefits nowadays, it also brings some of the concerns about the security and privacy of information. In this paper, we made a study about different security risks that pose a greatest threat to the cloud computing. This paper describes about the different security issues that are occurring in the various cloud computing frameworks and the areas where security lacks and measures can be taken to enhance the security mechanisms.
Keywords: Internet protocol, Infrastructure as a service, Platform as a service, Software as a service, Virtual machine.