{"title":"Security Challenges and Resolution in Cloud Computing and Cloud of Things","authors":"Mamata Rath","doi":"10.4018/978-1-5225-8295-3.CH004","DOIUrl":null,"url":null,"abstract":"Cloud computing is a developing zone of computing innovation that shapes the handling power and the computing assets of many associated, topographically separated PCs associated by means of internet. Cloud computing wipes out the need of having a total framework of equipment and programming to meet clients' prerequisites and applications. It very well may be thought of as a total or an incomplete outsourcing of equipment and programming assets. To get to cloud applications, a great internet association and a standard internet program are required. Cloud computing has its own particular downside from the security perspective; this chapter addresses the vast majority of these dangers and their conceivable arrangements. Cloud computing gives its client numerous abilities like getting to an expansive number of utilizations without the requirement for having a permit, acquiring, introducing, or downloading any of these applications.","PeriodicalId":285463,"journal":{"name":"Applying Integration Techniques and Methods in Distributed Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applying Integration Techniques and Methods in Distributed Systems and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-8295-3.CH004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cloud computing is a developing zone of computing innovation that shapes the handling power and the computing assets of many associated, topographically separated PCs associated by means of internet. Cloud computing wipes out the need of having a total framework of equipment and programming to meet clients' prerequisites and applications. It very well may be thought of as a total or an incomplete outsourcing of equipment and programming assets. To get to cloud applications, a great internet association and a standard internet program are required. Cloud computing has its own particular downside from the security perspective; this chapter addresses the vast majority of these dangers and their conceivable arrangements. Cloud computing gives its client numerous abilities like getting to an expansive number of utilizations without the requirement for having a permit, acquiring, introducing, or downloading any of these applications.