Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cloud Computing Security

Handbook of Research on Security Considerations in Cloud Computing
It is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand.
Published in Chapter:
Cloud Security Using Ear Biometrics
Santosh Kumar (Indian Institute of Technology, India), Ali Imam Abidi (Indian Institute of Technology, India), and Sanjay Kumar Singh (Indian Institute of Technology, India)
Copyright: © 2015 |Pages: 26
DOI: 10.4018/978-1-4666-8387-7.ch003
Abstract
Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Assessing Security with Regard to Cloud Applications in STEM Education
The complete strict engulfment of the cloud network, its resources, user’s data, and the accessibility of it in special continuously updated method and/or techniques that enable the cloud computing network impenetrable.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing Environments
Methods and techniques used by information technology professionals, cloud users and cloud security tools to lock-down Cloud Computing Environments to authorized users only and mitigate threats from inside and outside sources thus protecting information technology systems, files, services or assets within that cloud from cyber attack.
Full Text Chapter Download: US $37.50 Add to Cart
From Mainframe to Cloud
Is set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR