Cloud Computing and It's Security

Abstract

It is particularly relevant to Hong Kong because of the tremendous amounts of data that are being processed here daily in various sectors, research. There cent establishment of a major cloud R&D center in Hong Kong by Lenovo (January 2015) attests to this fact. The results will also benefit Hong Kong as the reliance on cloud computing services is rapidly increasing.

Country : India

1 Prof. Rana Afreen Sheikh2 Chetan V. Sonwal3 Vaishnavi S. Deshmukh4 Chinmay U. Shirkhedkar

  1. Professor, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  2. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  3. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  4. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India

IRJIET, Volume 7, Issue 10, October 2023 pp. 673-675

doi.org/10.47001/IRJIET/2023.710087

References

  1. Cloud computing. (2015).Retrieved from https://med.stanford.edu/irt/security/cloud.html
  2. GCFLearnFree.org. (Producer). (2012, March 08). Computer Basics: What is the Cloud? [WebVideo]. Retrieved from https://www.youtube.com/watch?v=gu4FYSFeWag
  3. Passary, S. (2015, June 15). Cloud computing is the future but not if security problems persist. Retrieved fromhttp://www.techtimes.com/articles/8449/20140615/cloud-computing-is-the-future-but-not-if-security-problems-persist.htm
  4. M.A. Vouk ,”cloud computing” issue , research and implementations, proc. Int. conf, inf, technol. interfaces , ITI, pp.31-40,2008.
  5. Spector, L. (2011, August 22). Is cloud-based backup safe?. Retrieved from http://www.pcworld.com/article/238503/cloud_backup_safe.ht ml 6. Bradford, C. (2019). 7 most infamous cloud security breaches –storagecraft. Retrieve from http://blog.storagecraft.com/7-infamous-cloud-security-breches.