Consideration of Cloud Computing and Its Security Issues

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 553

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

KBEI02_132

تاریخ نمایه سازی: 5 بهمن 1395

Abstract:

Cloud computing as a new solution offers its resource to client as a service. Using cloud based services are simple since clients need only a web browser and some experience. Considering privacy, security and data personalization, hacker may cause security challenges such as data loss, data leakage and etc. According to experts and literature about cloud security, clouds are not fully secured. Since data leakage cloud happens at any level of the cloud services, speaking of big challenges, security cloud operation and keeping it safe from cyber-attacks which make security of client data, information and privacy are the most critical issues. This paper offers different mechanisms for security cloud applications and data

Authors

Tahere Rezaie

M.sc student of Department of Electrical and Computer and Informatics Engineering Payame Noor University Tehran, Iran

Mehdi Khalili

Assistant Professor of Department of Electrical and Computer and Informatics Engineering Payame Noor University Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Malis, A. (1993). "Routing over Large Clouds (ROLC) Charter", part ...
  • Wikipedia. "John McCarthy (computer scientist)". http : //en .wikipedia.org/ wiki/ ...
  • Gartner. "SaaS Revenue Expected to Increase IS Percent". http : ...
  • S. Goyal, "Public vs Private vs Hybrid vs C ommunity-C ...
  • Wentao Liu, "Research on Cloud Computing Security Problem and Strategy", ...
  • Qi Zhang, Lu Cheng, Raouf Boutaba, "Cloud Computing: S tate-of-The-At ...
  • R. Latif, H. Abbas, S. Assar, and Q. Ali, "Cloud ...
  • J. Hwang, "Improving and repurposing data center resourcee usage with ...
  • J. Mun, Y. Jung, J. Kim, Y. Lee, K. Park, ...
  • Xiang Tana, Bo Aib, "The Issues of Cloud Computing Security ...
  • Ruchi Bhatnagar, "Proposal of Security Schemes For Protecting Services In ...
  • IEEE 2014 International Conference om Computer, _ ommunication, and Control ...
  • MSDN. "Threat modelling". http ://ms dn , microsoft. comlen-us/ library/ff4S ...
  • Boeyen, S. , Ellison, G. , et al. (2003). "Liberty ...
  • S. M. Moorthy, and M. R. Masillamani, "Intrusion detection in ...
  • Copyright Notice is: 978-1 -4673-6506-2/ 5/831 _ 00 G2015 IEEE ...
  • نمایش کامل مراجع