1. Identifying the threats in cloud computing
Authors : Adesh Kumar
Pages : 412-416
Keywords : Cloud ComputingThreatSecurity Abstract :
Cloud ciphering is characterized as a methodology to modify suitable, on requirement system admittance to a partitioned collective set up of configurable reckoning possessions. As new technology arises the new threats also arise hence the security for Cloud Computing is the most important area in cloud environments. In this paper a study is being done by me to identify main threats in cloud computing
Citing this Journal Article :Adesh Kumar, "Identifying the threats in cloud computing", Volume 3 Issue 4 - March 2014, 412-416
Click here to Submit Copyright Takedown Notice for this article.