Investigate the role of security in choosing cloud computing and a combination of security solutions

Publish Year: 1399
نوع سند: مقاله کنفرانسی
زبان: English
View: 280

This Paper With 7 Page And PDF and WORD Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CMECE03_033

تاریخ نمایه سازی: 16 اسفند 1399

Abstract:

We will first give a brief overview of cloud computing and a look at its history, as well as the role of security in the pervasiveness of this technology. Because many companies are very interested in using this technology, but the security of the information they put on the cloud is very important and vital for them, so the most important barrier to this technology is security. Factors such as: "Internal threats" occur by authenticated users and disclose information (external threats) by external attackers and do things such as change the network address. Access to accounts endangers the security of cloud computing. In this article, we review the methods that can ensure the security of this technology against the mentioned threats to a significant level. Finally, we will discuss whether to say yes to cloud computing or not>

Authors

AmirHossein Parandin,

Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Razi University

Masoumeh Bagheri

Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Payame Noor University

MohammadJavad Shahsavari

Student of Electronic Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Technical and Vocational University

Ahmad Ostovar

Student of English Language and Literature, Department of Literature and Humanities, Iran,Kermanshah, Razi University