<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="997" public="1" featured="1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/997?output=omeka-xml" accessDate="2026-04-10T15:11:30+00:00">
  <fileContainer>
    <file fileId="857">
      <src>https://archives.christuniversity.in/files/original/857b908c9c99cf20a033fca3a01e496f.pdf</src>
      <authentication>260f54b4e7b5c96c531799c96ebb90d7</authentication>
    </file>
  </fileContainer>
  <collection collectionId="23">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64989">
                <text>MPHIL</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="18">
    <name>Mphil</name>
    <description>Mphil Thesis</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="4731">
              <text>A Trust Model for Cloud Security and Privacy for Startups in India</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="4732">
              <text> MR Chengappa</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="4733">
              <text>2012</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="4734">
              <text>Computer Science</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="4735">
              <text>The great advantage of cloud computing is elasticity, the ability to add capacity or applications almost at a moments notice. Companies buy exactly the amount of storage, computing power, security and other IT functions that they need from specialists in data-centre computing. 

On the other side, there are also some disadvantages to using cloud computing that must be considered. In the cloud, the customer may not have the kind of control over their data or the performance of the applications that they need, or the ability to audit or change the processes and policies under which users must work. 

The security of cloud, and associated privacy concerns, give many organizations pause as they think through their particular cloud computing concerns. Security and privacy concerns include physical security and simple access to facilities and equipment, as well as logical security, industry compliance requirements, audit ability, and more. 

</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
