@article{2388, author = {Shweta Jaiswal, Manish Ahirwar, Raju Baraskar}, title = {Intruder Notification System & Security in Cloud Computing: A Review}, journal = {Information Security Education Journal}, year = {2017}, volume = {4}, number = {2}, doi = {}, url = {http://www.dline.info/isej/fulltext/v4n2/isejv4n2_3.pdf}, abstract = {Large-scale deployment & use of cloud computing in the industry is accompanied & in same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing & storage of company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that CS provider is able to protect their data & infrastructure from both external & internal attacks. Currently, however, such trust may only rely on organizational processes declared by CS provider & cannot be remotely verified & validated by an external party. Having tools to perform such verifications prior to launch as a VM instance, allows CS clients to decide at runtime whether certain data should be stored to calculations should be made at the VM instance offered by CS provider, This paper combines two components trusted computing, & cloud computing platforms to address issues of trust & security in public cloud computing environments.}, }