首页    期刊浏览 2024年07月06日 星期六
登录注册

文章基本信息

  • 标题:Cloud Computing Environment and Security Challenges: A Review
  • 本地全文:下载
  • 作者:Muhammad Faheem Mushtaq ; Urooj Akram ; Irfan Khan
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2017
  • 卷号:8
  • 期号:10
  • DOI:10.14569/IJACSA.2017.081025
  • 出版社:Science and Information Society (SAI)
  • 摘要:Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few years due to the scalability of resources and appear as a fast-growing segment of the IT industry. The dynamic and scalable nature of cloud computing creates security challenges in their management by examining policy failure or malicious activity. In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats. The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing. The security solution using the cryptography is specifically as the Public Key Infrastructure (PKI) that operates with Single-Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) which ensure the integrity, confidentiality, availability, and authenticity involved in communications and data.
  • 关键词:Cloud computing; deployment models; service models; cloud security; trusted third party; cryptography
国家哲学社会科学文献中心版权所有