{"title":"解决数据泄露问题的云计算安全挑战与威胁分析","authors":"M. Kaur, A. Kaimal","doi":"10.1109/ICCCI56745.2023.10128329","DOIUrl":null,"url":null,"abstract":"Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":" 24","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Cloud Computing Security Challenges and Threats for Resolving Data Breach Issues\",\"authors\":\"M. Kaur, A. Kaimal\",\"doi\":\"10.1109/ICCCI56745.2023.10128329\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.\",\"PeriodicalId\":205683,\"journal\":{\"name\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"volume\":\" 24\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Computer Communication and Informatics (ICCCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCI56745.2023.10128329\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Cloud Computing Security Challenges and Threats for Resolving Data Breach Issues
Technology now affects every element of the high-tech society, which creates an environment that permits attackers to gain access easily, cheaply and attack a particular organization. The organization struggles to quickly notice it, though. With cloud computing, users can save data online and over a network. Additionally, the data is accessible from anywhere in the world. IT-related capabilities can be accessed by multiple users as a service through internet because of cloud computing, and these services are charged as per use. A substantial rise in the use of various cloud services has occurred based on the adoption of cloud technology by several cloud computing providers, including Microsoft, Google, IBM, Yahoo and Amazon. The Amazon is ruling the market due to its architectural characteristics. Different paid tools and open-source tools are being developed to meet the requirements. Since security is a crucial matter, most individuals are apprehensive about storing their pivotal information in a cloud, especially those who are unaware about the rise in attacks and the advancement of technology. There have been numerous advancements made when it comes to cloud computing, many challenges still need to be resolved, including those relating to security, interoperability, resource scheduling, virtualization, etc.This paper carries out a systematic literature review by detecting cloud computing safety challenges and threats, also offers ideas for resolving data breach issues.