Volume 3 Issue 4 - March 2014

  • 1. Identifying the threats in cloud computing

    Authors : Adesh Kumar

    Pages : 412-416

    Keywords : Cloud ComputingThreatSecurity

    Abstract :

    Cloud ciphering is characterized as a methodology to modify suitable, on requirement system admittance to a partitioned collective set up of configurable reckoning possessions. As new technology arises the new threats also arise hence the security for Cloud Computing is the most important area in cloud environments. In this paper a study is being done by me to identify main threats in cloud computing

    Citing this Journal Article :

    Adesh Kumar, "Identifying the threats in cloud computing", https://www.ijltet.org/journal_details.php?id=891&j_id=2873, Volume 3 Issue 4 - March 2014, 412-416, #ijltetorg