Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security in Cloud Computing and Social Networking


Affiliations
1 Dept of Information Technology, Kovai Kalaimagal College of Arts and Science, Bharathiar University, Tamil Nadu, India
2 Department of Computer Science, Kovai Kalaimagal College of Arts and Science, Bharathiar University, Tamil Nadu, India
     

   Subscribe/Renew Journal


The last several decades, dramatic advances in computing power, storage, and networking technology have allowed the human race to generate, process, and share increasing amounts of information in dramatically new ways. Recently, a number of commercial and academic organizations have built large systems from commodity computers, disks, and networks, and have created software to make this hardware easier to program and manage with help of the most powerful and promising technologies called as a cloud-computing environment. Cloud computing is a combination of several key technologies that have evolved and matured over the years. It has a potential for cost savings to the enterprises but the security risk are also enormous. Enterprise looking into cloud computing technology as a way to cut down on cost and increase profitability should seriously analyze the security risk of cloud computing. Subsequently, the Internet has significantly changed the way our society connects with one another, does business, and socializes. Today’s youth have never known a world without the Internet, which is a piece of information adults must put into context when they think about and compare, generationally,  social networking use to face-to-face communications. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. In this study will discuss the importance and overview of cloud computing and social network and their security issues and also present the most specific uses. 


Keywords

Cloud Computing, Social Networking, Security Issues, Uses.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 259

PDF Views: 3




  • Security in Cloud Computing and Social Networking

Abstract Views: 259  |  PDF Views: 3

Authors

C. Senbagavalli
Dept of Information Technology, Kovai Kalaimagal College of Arts and Science, Bharathiar University, Tamil Nadu, India
A. Kirubha
Department of Computer Science, Kovai Kalaimagal College of Arts and Science, Bharathiar University, Tamil Nadu, India

Abstract


The last several decades, dramatic advances in computing power, storage, and networking technology have allowed the human race to generate, process, and share increasing amounts of information in dramatically new ways. Recently, a number of commercial and academic organizations have built large systems from commodity computers, disks, and networks, and have created software to make this hardware easier to program and manage with help of the most powerful and promising technologies called as a cloud-computing environment. Cloud computing is a combination of several key technologies that have evolved and matured over the years. It has a potential for cost savings to the enterprises but the security risk are also enormous. Enterprise looking into cloud computing technology as a way to cut down on cost and increase profitability should seriously analyze the security risk of cloud computing. Subsequently, the Internet has significantly changed the way our society connects with one another, does business, and socializes. Today’s youth have never known a world without the Internet, which is a piece of information adults must put into context when they think about and compare, generationally,  social networking use to face-to-face communications. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. In this study will discuss the importance and overview of cloud computing and social network and their security issues and also present the most specific uses. 


Keywords


Cloud Computing, Social Networking, Security Issues, Uses.