Enhancement of Security in Cloud Computing
Keywords:
Cloud Server, Encryption, Deployment, ModelAbstract
Cloud Computing provides us means of accessing the applications as utilities over the Internet. It allows us to create, configure, and customize the applications online.
References
Amazon. (2011). Amazon Web Services: Overview of Security Processes. Retrieved from
http://media.amazonwebservices.com/pdf/AWS_Se curity_Whitepaper.pdf
Arora, P., Biyani, R. and Dave, S. (2011). To the cloud:Cloud powering an enterprise. McGraw-Hill. Buck, K. and Hanf, D. (2009).
Mitre cloud computing series, Cloud SLA considerations for the government consumer. Retrieved from
http://www.mitre.org/work/tech_papers/2010/10_29 02/cloud_sla_considerations_government.pdf
Introduction to Cryptography http://en.wikipedia.org/wiki/Cryptography
Traditional Cloud server security http://cloudsecuritythreats.blogspot.in/2011/11/traditional-security.html
Fundamentals of Cryptography: Algorithm and Security Services by Professor Guevara Noubir
http://www.ccs.neu.edu/home/noubir/Courses/CSU 610/S06/cryptography.pdf
Logik Bomb: Hacker's Encyclopedia (1997)
Hafner, Katie; Markoff, John (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster. ISBN 0- 671-68322-5.
Sterling, Bruce (1992). The Hacker Crackdown. Bantam. ISBN 0-553-08058-X.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.