Analyze The Importance, Benefits, And Challenges Of Security In Cloud Computing And Examine Methods For Increasing Information Security In The Cloud

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 163

This Paper With 15 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

TETSCONF15_007

تاریخ نمایه سازی: 17 فروردین 1404

Abstract:

Cloud computing has become a popular technology for companies seeking to achieve agility and flexibility to accelerate innovation and meet consumer expectations in the modern world. But migrating to more dynamic cloud environments requires new security approaches to ensure data security across infrastructure, applications, and platforms. Cloud computing security is one of the fundamental pillars of cloud computing services, without which even ordinary people would not try to store a simple photo in this service. Perhaps at first glance, cloud security is for you to protect and safeguard information such as photos, videos, personal documents, etc. But the problem is that in fact, ordinary people like you and me are part of the black army for the huge cloud service system and provide a small part of the revenue of the service providers. Therefore, large companies providing services such as cloud computing are trying to increase the security of various cloud computing services for important organizations and bodies with confidential information documents. But don't worry, as regular users will also benefit from the development of cloud computing security. Cloud security is a set of measures, solutions, and technologies that are used to improve the protection of cloud infrastructures, the data contained in them, and the privacy of users. Cloud infrastructures are a platform for hosting organizations' data and advancing their goals, so it is very important to operate without disruption and maintain security in them. In this article, cloud computing security has been thoroughly examined from various dimensions.

Authors

Marziyeh Barootkar

Department of Computer Engineering, National University of Skills (NUS), Tehran, Iran

Arshia Bayat

Bachelor of Computer Science, Kermanshah University of Technology

Mohammad Taher Hasani

Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran, Iran