Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/4056
Title: | RESEARCH ON KEY SECURITY STRATEGIES OF CLOUD COMPUTING |
Authors: | Najim, Saif Al-din M. Al-Barzinji, Shokhan M. |
Keywords: | Cloud computing Data security Data privacy Cloud Cryptography Security threats |
Issue Date: | 30-Sep-2018 |
Publisher: | Journal of Theoretical and Applied Information Technology |
Series/Report no.: | 96;18 |
Abstract: | The platform of Cloud computing is model based on Internet environment which enables an easy on-demand access and usage payment of each access and utilization of pool of networks that is shared among multiple users. This type of computing is considered as another innovation that fulfils users’ needs and requirements for resources of computing like stockpiling, systems, administrations and applications as well as servers. Securing the cloud’s stored Data is seen as one of the significant principles with many challenges and concerns in the research of cloud computing. This study has reviewed the research in a critical manner which focused on the types of cloud computing, industries, deployments and models of delivery. This constant issue is becoming more impactful because of the emerging challenges in cloud computing technology management. From the client’s point of view, the security in cloud computing is hazardous, typically in the matter of assurance affirmation problems and securing the data. These problems create shortcomings that hinder the adoption of cloud computing administrations. This paper inspects and illustrates the critical issues of cloud computing in relation to the privacy and protection on the Cloud. Lastly, this paper is concluded with a review to the literature stated as well suggesting on-going future studies. |
URI: | http://localhost:8080/xmlui/handle/123456789/4056 |
ISSN: | 1992-8645 |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
cloudpaper.pdf | 544.71 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.