基于使用的云系统的安全映射

R. Kamatchi, Kimaya Ambekar, Yashvi Parikh
{"title":"基于使用的云系统的安全映射","authors":"R. Kamatchi, Kimaya Ambekar, Yashvi Parikh","doi":"10.5296/npa.v8i4.10240","DOIUrl":null,"url":null,"abstract":"The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Security Mapping of a Usage Based Cloud System\",\"authors\":\"R. Kamatchi, Kimaya Ambekar, Yashvi Parikh\",\"doi\":\"10.5296/npa.v8i4.10240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.\",\"PeriodicalId\":190994,\"journal\":{\"name\":\"Netw. Protoc. Algorithms\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Netw. Protoc. Algorithms\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5296/npa.v8i4.10240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Netw. Protoc. Algorithms","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5296/npa.v8i4.10240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

云计算技术的普及程度正在急剧增加。关于云的数据存储和数据转换技术的有效性,人们没有分歧。早些时候,它使用分布式计算只是为了共享资源。然而,随着技术的进步,云计算变得越来越强大,在各个业务领域的适应性也越来越强。然而,随着用户数量的增加,影响用户隐私、个人数据、身份和机密性的安全威胁也在增加。在本文中,我们的目标是根据云的使用类型对安全和隐私威胁进行分类。我们还提出了一种算法,可以根据使用类别找到适当的解决方案来解决与安全和隐私相关的问题。本文有助于在不损害数据存储优势的情况下提高云技术用户的安全性和隐私性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security Mapping of a Usage Based Cloud System
The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信