Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash
{"title":"云计算中的数据安全分析综述","authors":"Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash","doi":"10.1109/ICIEM51511.2021.9445355","DOIUrl":null,"url":null,"abstract":"All the organization wants to implement the same security parameters as they are already using with their internal data/resources. It is mandatory to understand and find the data protection challenges before outsourcing the data security in cloud computing. In present research we are discussing about the impact of security in cloud computing including all the challenges associated with it.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Analytical Review of Data Security in Cloud Computing\",\"authors\":\"Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash\",\"doi\":\"10.1109/ICIEM51511.2021.9445355\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"All the organization wants to implement the same security parameters as they are already using with their internal data/resources. It is mandatory to understand and find the data protection challenges before outsourcing the data security in cloud computing. In present research we are discussing about the impact of security in cloud computing including all the challenges associated with it.\",\"PeriodicalId\":264094,\"journal\":{\"name\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEM51511.2021.9445355\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEM51511.2021.9445355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analytical Review of Data Security in Cloud Computing
All the organization wants to implement the same security parameters as they are already using with their internal data/resources. It is mandatory to understand and find the data protection challenges before outsourcing the data security in cloud computing. In present research we are discussing about the impact of security in cloud computing including all the challenges associated with it.