International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 18    Submit Your Rating     Cite This   Download        Certificate

ARTICLE WITH WRITING, TOPIC : DATA BASE SECURITY IN CLOUD COMPUTING

    2 Author(s):  BHAVESH KUMAR YADAV , NIRAJ SINGHAL

Vol -  8, Issue- 9 ,         Page(s) : 138 - 143  (2017 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The use of the cloud computing atmosphere to cater to the stress of users within the web has created information security an essential issue. Security could be a essential issue in cloud computing as a result of the range of IT services which will be provided through a cloud atmosphere. This paper highlights that information security ought to guarantee knowledge confidentiality, integrity and convenience on any system. enclosed within the discussion square measure the newest security ways and current trends to shield the system against potential threats. Cryptography, secret key ways, digital signatures and certificates square measure introduced as means that to shield databases.

  1. Buyya Rajkumar, Broberg James & Goscinski, , 2011 Cloud Computing Principles and Paradigms, John Wiley & Sons, Inc., Hoboken, New Jersey USA ISBN: 978 0 470 88799 8 
  2. NIST, the NIST definition of cloud computing, September2012,http://csrc.nist.gov/publications/nistpubs /800-145/SP800-145.pdf, 
  3. Cloud Security Alliance, 2011 Security guidance for critical areas of focus in cloud computing V3.0, , 
  4. Danielson, Krissi (2008-03-26) 2010 august. "Distinguishing Cloud Computing from Utility Computing". Retrieved.
  5. Keep an eye on cloud computing, Amy Schurr, Network World, 2008-07-08, ,Sep 2009citing the Gartner report, "Cloud Computing Confusion Leads to Opportunity". Retrieved 
  6. B. Rochwerger, J. Caceres, R.S. Montero, D. Breitgand, E. Elmroth, A. Galis, E. Levy, I.M. Llorente, K. Nagin, Y. Wolfsthal, E. Elmroth, J. Caceres, M. BenYehuda, W. Emmerich, F. Galan.2009 "The RESERVOIR Model and Architecture for Open Federated Cloud Computing", IBM Journal of Research and Development, Vol. 53, No. 4 
  7. IEEE International Conference on Cloud Computing (CLOUD).Thecloudcomputing.org. http://www.thecloudcomputing.org. Retrieved 2010-08-22.
  8. WETHERALL, D.1999 Active Network Vision and Reality: Lessons from a Capsule-Based System. In SOSP 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details