Study of Efficient Cloud Storage Architectures for the Security Environment

Ayad Hasan
{"title":"Study of Efficient Cloud Storage Architectures for the Security Environment","authors":"Ayad Hasan","doi":"10.31642/jokmc/2018/100108","DOIUrl":null,"url":null,"abstract":"Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term \"cloud data storage\" describes the process of transferring data to an external, up-to-date storage system. You store data to a far-off database instead of your PC's hard plate or another nearby storage gadget. Your PC and the database are associated over the web. The user's requirements for hardware and software are reduced via cloud storage. The security issues associated with accessing and storing data on cloud storage render the cloud information inconsistent and untrustworthy. Through the internet, the cloud computing provides service with dynamically scalable resources. Users gain from cloud computing services in terms of cost and usability. Security issues must be addressed by cloud computing services when sending sensitive data and important applications to shared and public cloud environments. For the needs of data processing and storage, cloud environments are expanding up significantly. The use of cloud computing has a number of benefits as well as drawbacks for service users' data security. The primary security concerns that exist in cloud computing systems are highlighted in this study. The essential security worries with cloud computing are examined in this paper, alongside a straightforward, secure, and protection saving architecture for between cloud data sharing that depends on an encryption/unscrambling calculation that expects to shield data put away in the cloud from unapproved access.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Kufa for Mathematics and Computer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31642/jokmc/2018/100108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system. You store data to a far-off database instead of your PC's hard plate or another nearby storage gadget. Your PC and the database are associated over the web. The user's requirements for hardware and software are reduced via cloud storage. The security issues associated with accessing and storing data on cloud storage render the cloud information inconsistent and untrustworthy. Through the internet, the cloud computing provides service with dynamically scalable resources. Users gain from cloud computing services in terms of cost and usability. Security issues must be addressed by cloud computing services when sending sensitive data and important applications to shared and public cloud environments. For the needs of data processing and storage, cloud environments are expanding up significantly. The use of cloud computing has a number of benefits as well as drawbacks for service users' data security. The primary security concerns that exist in cloud computing systems are highlighted in this study. The essential security worries with cloud computing are examined in this paper, alongside a straightforward, secure, and protection saving architecture for between cloud data sharing that depends on an encryption/unscrambling calculation that expects to shield data put away in the cloud from unapproved access.
面向安全环境的高效云存储架构研究
最近,云计算声名狼藉。数据存储是云计算中一个重要且有益的集中领域。术语“云数据存储”描述了将数据传输到外部最新存储系统的过程。你将数据存储到一个遥远的数据库中,而不是PC的硬盘或附近的其他存储设备。你的电脑和数据库通过网络联系在一起。通过云存储降低了用户对硬件和软件的要求。与在云存储上访问和存储数据相关的安全问题使云信息不一致且不可信。云计算通过互联网提供资源动态扩展的服务。用户从云计算服务中获得了成本和可用性方面的好处。在向共享云和公共云环境发送敏感数据和重要应用程序时,云计算服务必须解决安全问题。对于数据处理和存储的需求,云环境正在显著扩展。云计算的使用对服务用户的数据安全有许多好处和缺点。本研究强调了云计算系统中存在的主要安全问题。本文研究了云计算的基本安全问题,以及云数据共享的简单、安全和保护保存架构,该架构依赖于加密/解扰计算,期望保护存储在云中的数据免受未经批准的访问。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信