Investigate the role of security in choosing cloud computing and a combination of security solutions
Publish Year: 1399
نوع سند: مقاله کنفرانسی
زبان: English
View: 280
This Paper With 7 Page And PDF and WORD Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CMECE03_033
تاریخ نمایه سازی: 16 اسفند 1399
Abstract:
We will first give a brief overview of cloud computing and a look at its history, as well as the role of security in the pervasiveness of this technology. Because many companies are very interested in using this technology, but the security of the information they put on the cloud is very important and vital for them, so the most important barrier to this technology is security. Factors such as: "Internal threats" occur by authenticated users and disclose information (external threats) by external attackers and do things such as change the network address. Access to accounts endangers the security of cloud computing. In this article, we review the methods that can ensure the security of this technology against the mentioned threats to a significant level. Finally, we will discuss whether to say yes to cloud computing or not>
Keywords:
Authors
AmirHossein Parandin,
Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Razi University
Masoumeh Bagheri
Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Payame Noor University
MohammadJavad Shahsavari
Student of Electronic Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Technical and Vocational University
Ahmad Ostovar
Student of English Language and Literature, Department of Literature and Humanities, Iran,Kermanshah, Razi University