Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/4056
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNajim, Saif Al-din M.-
dc.contributor.authorAl-Barzinji, Shokhan M.-
dc.date.accessioned2022-10-20T16:43:19Z-
dc.date.available2022-10-20T16:43:19Z-
dc.date.issued2018-09-30-
dc.identifier.issn1992-8645-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/4056-
dc.description.abstractThe platform of Cloud computing is model based on Internet environment which enables an easy on-demand access and usage payment of each access and utilization of pool of networks that is shared among multiple users. This type of computing is considered as another innovation that fulfils users’ needs and requirements for resources of computing like stockpiling, systems, administrations and applications as well as servers. Securing the cloud’s stored Data is seen as one of the significant principles with many challenges and concerns in the research of cloud computing. This study has reviewed the research in a critical manner which focused on the types of cloud computing, industries, deployments and models of delivery. This constant issue is becoming more impactful because of the emerging challenges in cloud computing technology management. From the client’s point of view, the security in cloud computing is hazardous, typically in the matter of assurance affirmation problems and securing the data. These problems create shortcomings that hinder the adoption of cloud computing administrations. This paper inspects and illustrates the critical issues of cloud computing in relation to the privacy and protection on the Cloud. Lastly, this paper is concluded with a review to the literature stated as well suggesting on-going future studies.en_US
dc.language.isoenen_US
dc.publisherJournal of Theoretical and Applied Information Technologyen_US
dc.relation.ispartofseries96;18-
dc.subjectCloud computingen_US
dc.subjectData securityen_US
dc.subjectData privacyen_US
dc.subjectCloud Cryptographyen_US
dc.subjectSecurity threatsen_US
dc.titleRESEARCH ON KEY SECURITY STRATEGIES OF CLOUD COMPUTINGen_US
dc.typeArticleen_US
Appears in Collections:قسم نظم المعلومات

Files in This Item:
File Description SizeFormat 
cloudpaper.pdf544.71 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.