首页    期刊浏览 2024年11月26日 星期二
登录注册

文章基本信息

  • 标题:Understanding Shared Technology in Cloud Computing and Data Recovery Vulnerability
  • 本地全文:下载
  • 作者:Tribikram Pradhan ; Mukesh Patidar ; Keerthi Reddy
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2012
  • 卷号:3
  • 期号:4
  • 页码:778-782
  • 语种:English
  • 出版社:Ayushmaan Technologies
  • 摘要:Cloud computing is a virtualization technology which uses sharing the pool of computer resources. Cloud is an emerging technology which combines the features of traditional computing technology with networking technology like parallel, distributed or grid computing. Cloud computing is a new version of internet evolution which can handle large number of customers at a time by sharing the resources over internet. The data owner can remotely store their data in cloud and enjoy the cloud characteristics like ondemand self service, resource pooling, rapid elasticity, ubiquitous network access, rapid elasticity, measured service. Vulnerability is an important factor of risk in cloud computing which is exploited by threat causing harm to system. Cloud vulnerabilities include unauthorized access to management interface, internet protocol vulnerabilities, data recovery vulnerability and metering and billing evasion. Management interface is required for cloud computing on demand characteristics. Unauthorized access to management interface is an issue. The cloud services are accessed over internet using the standard protocol which is entrusted so the network vulnerability is relevant to cloud computing. In cloud we are enjoying pay-peruse that is the service we are using are metered. In this paper is focusing on data recovery vulnerability which uses the cloud characteristics of resource pooling and elasticity of resources. In this the resource allocated to one user is reallocated to different user in later time. The solution we are presenting here is giving strong access control, authentication to administrative access and operations, conducting scanning for vulnerability, complete deletion of user’s data after usage, evaluating the unauthorized environment, make a strong service level agreement for vulnerability remediation, strongly encrypting the data.
  • 关键词:Cloud Computing;Eucalyptus;Security;Privacy
国家哲学社会科学文献中心版权所有