Execution of Security Requirements in Cloud Computing

Download Now
Provided by: International Journal of Reviews on Recent Electronics and Computer Science (IJRRECS)
Topic: Security
Format: PDF
Cloud computing make available dynamic provisioning and consequently can distribute machines to store up data and append or eliminate the machines consistent with workload demands. It is a setting for resource sharing devoid of awareness of infrastructure and makes it feasible to access applications and its related data from anywhere at any instant and is on the basis of virtualization technology which is used to distribute data center resources energetically based on demands of application. There are quite a lot of approaches on how to implement protection policies in cloud computing, for instance safe selective sharing of resources on basis of new encryption methods.
Download Now

Find By Topic