Rapid and Proactive Approach on Exploration of Vulnerabilities in Cloud Based Operating Systems

Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These assets can be dynamically reconfigured to adjust to a variable scale, allowing also for optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the infrastructure provider by means of customized Service Level Agreement (SLA). Cloud computing was originally designed for dealing with problems involving large amounts of data and/or compute-intensive applications. The vulnerabilities inherent in the Cloud systems should be addressed so they can be eliminated before exploited by malicious software or hackers.

Provided by: International Journal of Computer Applications Topic: Cloud Date Added: Mar 2012 Format: PDF

Find By Topic