Cloud computing is a promising technology where computational power is provided over internet as per users demand just like the supplies daily utilities of tap water, electricity and gas provided as pay per use. The features of easy accessibility anywhere at any time and almost no burden of on-going operational expenses like running of data-centre makes it one of the fastest growing technologies with the overall business of cloud being anticipated to be above $40 billion by 2012.
Here, cloud computing and its types have been discussed along with two emerging cloud deployment models and two emerging cloud service models. Block chains, Organic Network, Dynamic Trust Management Method (DTMM) and Cloud Compliance have been elaborated. Though data protection laws can be different with change in jurisdiction but here emphasis has been given on data policies existing in India based on IT Act (2000). Finally a reference model has been suggested for avoiding DDoS and Blockchain DDoS Attacks in Cloud Environment. The discussions has been concluded highlighting the recommendations and necessary actions needed for the same.
Other Reads by the Author
The Trial of Hope (Amazon)
An Alien Land (Kobo)
2 Moms (Kobo)
Unfolding Disaster (Kobo)
Walk to School (Kobo)
51 Points in Raising Awesome Kids (Kobo)
Organic IT Infrastructure Planning and Implementation (Amazon)
Grin Books
Positive Employee Recruitment and Retention Vital for Organizations
Digital India Mission. Implications on Social Inclusion and Digital Citizenship
Cloud Computing. DDoS, Blockchain, Regulation and Compliance
Organic eLearning (OE-Learning)
The Way of Prime Minister Narendra Modi's Leadership
Feasibility Study between Continuous Adaptive Risk and Trust Assessment and Organic Networks
I am my supervisor’s slave: Supervisor subordinate relationship is vital for organizational efficiency
Brands and their Shockvertisement Strategies
The Future of Blockchain in Banking
Social Media Marketing: Author’s Quandary Decoded (Amazon)
Table of Content
Summary
Cloud
DDoS Attacks in Cloud
Blockchain for Cloud
Organic Networks – merger of ‘viral and social’ networks [20]
Using Private Blockchain with DTMM in Cloud Platform
Compliance in Cloud
Conclusion
References
- Quote paper
- Manisha Kumari Deep (Author), 2018, Cloud Computing. DDoS, Blockchain, Regulation and Compliance, Munich, GRIN Verlag, https://www.grin.com/document/416755
-
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X.