Securing the E-World through Cloud Computing a Revolutionary Technique and Applications

Exploring the Security Challenges and Solutions in Cloud Computing

Authors

  • G. A. Patil Author
  • Dr. V. A. Athavale Author

Keywords:

cloud computing, E-world, security, revolutionary technique, applications, user verification, network security, application security, virtualization security, security framework

Abstract

This paper presents securing the E-worldthrough Cloud Computing. Cloud computing has rapidly become one of themost famous buzzwords in the IT world due to its revolutionary model ofcomputing as a usefulness. It promises greater than before suppleness,scalability, and reliability, while talented decreased operational and hold upcosts. Cloud computing is a revolutionary concept that has brought a paradigmshift in the IT world. This has made it likely to manage and run businesseswith no even setting up an IT infrastructure. It offers multifold benefits tothe users moving to a cloud, while posing unknown security and privacy issues.User verification is one such on the increase anxiety and is greatly needed inorder to make sure privacy and security in a cloud computing environment. Thepaper also discusses the security at different levels viz. network, applicationand virtualization, in a cloud computing surroundings. A security frameworkbased on one-time pass key mechanism has been proposed. The individuality ofthe future security protocol lies in the fact, that it provides security toboth the service providers as well the users in a highly conflicting cloudenvironment

Downloads

Download data is not yet available.

Downloads

Published

2014-08-01