{"title":"基于使用的云系统的安全映射","authors":"R. Kamatchi, Kimaya Ambekar, Yashvi Parikh","doi":"10.5296/npa.v8i4.10240","DOIUrl":null,"url":null,"abstract":"The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security Mapping of a Usage Based Cloud System\",\"authors\":\"R. Kamatchi, Kimaya Ambekar, Yashvi Parikh\",\"doi\":\"10.5296/npa.v8i4.10240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.\",\"PeriodicalId\":190994,\"journal\":{\"name\":\"Netw. Protoc. Algorithms\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Netw. Protoc. Algorithms\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5296/npa.v8i4.10240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Netw. Protoc. Algorithms","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5296/npa.v8i4.10240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.