Data Security In Cloud Computing: A Review

Gurjeet Singh, M. Garg
{"title":"Data Security In Cloud Computing: A Review","authors":"Gurjeet Singh, M. Garg","doi":"10.24297/IJCT.V17I2.7551","DOIUrl":null,"url":null,"abstract":"Cloud computing is Internet (\"cloud\") based development and use of computer technology (\"computing\"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24297/IJCT.V17I2.7551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.
云计算中的数据安全:综述
云计算是基于互联网(“云”)的计算机技术(“计算”)的开发和使用。它是一种计算方式,其中动态可伸缩且通常是虚拟化的资源通过Internet作为服务提供。云计算使用互联网和中央远程服务器来支持不同的数据和应用程序。它是一种基于互联网的技术。它允许用户在任何一台能上网的电脑上访问他们的个人文件。云计算灵活性是根据权威机构的请求分配资源的函数。云计算提供了统一的行为。21世纪的科学计算已经从固定的工作环境发展到分布式的工作环境。云计算(CC)的当前趋势允许通过连接到Internet从任何地方访问业务应用程序。有证据表明,转向CC组织的年度支出和维护都在更大程度上减少。然而,伴随着云计算的各种好处而来的是一些挑战。其中包括安全方面。我们的目标是确定云计算及其解决方案在现实世界中的安全挑战,以应对没有确定任何适当缓解战略的挑战。全球标准和指南的不存在可以帮助学者了解实践状况,并制定更好的方法/标准来提供安全的互操作性。从业人员可以参考已确定的云计算安全挑战和解决方案,以了解在适应/迁移到云计算环境时需要关注哪些安全领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信