TY - JOUR T1 - Cloud Zones: Security and Privacy Issues in Cloud Computing AU - Chandrareddy, B. Jaya AU - Mahesh, G. Uma AU - Bandi, Sreekanth JO - Asian Journal of Information Technology VL - 11 IS - 3 SP - 83 EP - 93 PY - 2012 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2012.83.93 UR - https://makhillpublications.co/view-article.php?doi=ajit.2012.83.93 KW - Cloud zones KW -privacy KW -policies KW -host and data security KW -weakness KW -India AB - In meteorology, the most destructive extra tropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front creating a zone that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the zone. The cloud zone formation provides a useful analogy for cloud computing in which the most acute obstacles with outsourced services (the cloud zone) are security and privacy issues. This study identifies key issues which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. ER -