UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 3
March-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1903A14


Registration ID:
200446

Page Number

100-107

Share This Article


Jetir RMS

Title

CLOUD DATA MODELS FOR COST CONTAINMENT DEPENDING USING - CLOUD SECURITY VULNERABILITIES

Abstract

Abstract: Information Model for Cloud registering With the unstable development of Cloud and gigantic information created at the edge of the system, the customary brought together distributed computing model has come to administrations because of the data transfer capacity restriction and assets limitation. In this way, edge registering to utilize Google Compute Engine (GCE), which empowers putting away and handling information at the edge of the system, has risen as a promising innovation lately. Be that as it may, Enterprise Cloud Services enhances; Consumer Cloud Services will Implemented for Cloud-based File Sharing Services will Increase, Collaboration Services will turn out to be progressively recognizable, Social Media Services will get democratized and get the most astounding appropriation, has likewise presented a few new difficulties in the information security and security safeguarding, which are additionally the key worries of the other winning processing worldview, for example, distributed computing, Despite its significance, there still comes up short on an overview of the ongoing exploration advance of information security and protection saving in the Google Compute Engine(GCE).In this paper, we present an extensive investigation of the information security and protection models, insurance innovations, and countermeasures innate in Hybrid Cloud Solutions. Uncommonly definite examinations of information security and protection necessities, difficulties, and systems in edge registering are exhibited. At that point, Cloud Storage and its Multi-Faceted Usage for settling information security and protection issues are outlined. The cutting edge information security and protection arrangements in related standards are likewise studied. At long last, we propose a few open research bearings of information security Cloud registering Environments.

Key Words

Cloud Computing, Google Compute Engine(GCE),Analysis, privacy issues.

Cite This Article

"CLOUD DATA MODELS FOR COST CONTAINMENT DEPENDING USING - CLOUD SECURITY VULNERABILITIES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 3, page no.100-107, March-2019, Available :http://www.jetir.org/papers/JETIR1903A14.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CLOUD DATA MODELS FOR COST CONTAINMENT DEPENDING USING - CLOUD SECURITY VULNERABILITIES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 3, page no. pp100-107, March-2019, Available at : http://www.jetir.org/papers/JETIR1903A14.pdf

Publication Details

Published Paper ID: JETIR1903A14
Registration ID: 200446
Published In: Volume 6 | Issue 3 | Year March-2019
DOI (Digital Object Identifier):
Page No: 100-107
Country: ariyalur, tamilnadu, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002936

Print This Page

Current Call For Paper

Jetir RMS