首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:A Study On The Security Requirements, Risk Identification, And Threats Associated With Cloud Computing
  • 本地全文:下载
  • 作者:Minhaj khan ; Mohammadi Akheela Khanum
  • 期刊名称:Webology
  • 印刷版ISSN:1735-188X
  • 出版年度:2022
  • 卷号:19
  • 期号:2
  • 页码:1975-1995
  • 语种:English
  • 出版社:University of Tehran
  • 摘要:figuring may be termed Internet-based computing, in which communal assets, software programs, and facts are made handy on request. The cloud computing setup offers smooth-to-get right of entry to the carrier for personal and private bases &records. Cloud computing has received significant recognition due to uninterruptedly growing desires over the last long time. Organizations that migrate to cloud-based annals storage solutions reap a slew of benefits. It reduces the rate and complexity of carrier corporations thru the fashion of belongings and active charges. The global is watching a tremendous growth inside the cloud-aided services and is foreseen to expand in addition with the stepped forward technological revolutions. It lets in patrons to get proper entry to drivers tenuously. Despite the enormous rewards of the Cloud computing paradigm, cloud figuring has mounted to have a few barriers and downsides, primarily regarding privateness of consumer's facts and protection associated danger. Since this technology's assemblies rely upon the Internet, a character cannot get the right of entry to their applications, server, or data from the mist, so outmoded safety shape does not follow here due to the truth the client does no lengthier very own the infrastructure anymore. This paper consists of the dangers and protection issues allied with Cloud Figuring. The storyline assessment provided in this paper gives cloud care issues and requirements, recognized risks, and threats. This artwork goals to investigate the appealing gears of cloud computing similarly to offer protection and privateness problems that this placing faces and observe in-depth know-how about the safety danger factors that cloud entities calm with cloud worker companies face on a regular foundation.
  • 关键词:Cloud Computing;Service models;deployment models;Cloud computing security requirement
国家哲学社会科学文献中心版权所有