Loading

Cloud Computing: Risk Analysis on Cloud Security
Supreet Kaur1, Amanpreet Singh2, Rajeev Kumar3

1Supreet Kaur, Department of Computer Science, Lyallpur Khalsa College – Jalandhar, India.
2Amanpreet Singh, Assistant Professor, Department of Computer Science and Engineering, ST Soldier Institute of Engineering and Technology, Punjab, India.
3Dr. Rajeev Kumar, Associate Professor, Department of Computer Science and Engineering, Teerthanker Mahaveer University, Teerthanker Mahaveer University, Moradabad (U.P.), India.
Manuscript received on January 12, 2017. | Revised Manuscript received on January 19, 2017. | Manuscript published on January 31, 2017. | PP: 15-17 | Volume-3 Issue-7, January 2017. | Retrieval Number: G0392013717
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Since the cloud’s idea needs surveying of assets with extra cloud owner’s, subsequently, business rudiments or other customer basic data is available for cloud and in addition to outcast cloud. In any foundation of distributed computing, a noteworthy component is security since essential is guaranteeing the approved get to and secure lead is ordinary. Standard issues of security still have in distributed computing. However, as large business limits have been extended to the cloud, standard security frameworks are not completely sensible for data and applications in cloud.
Keywords: Cloud computing.