关注云安全问题:挑战和开放问题

{"title":"关注云安全问题:挑战和开放问题","authors":"","doi":"10.30534/ijacst/2023/0211212023","DOIUrl":null,"url":null,"abstract":"The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of where the data is geographically located at any particular time. So a question arises as to how secure is the data contained in the Cloud. To help address this question, clients of the Cloud should be given the ability to assess the effectiveness of the Cloud’s security measures. Other concerns include unwarranted and unauthorized stoppage of clients’ services in the Cloud, breach of security measures, and disruption to service availability. In this article, perspectives from Cloud computing practitioners are shown to help address clients concerns and bring about awareness of the measures put in place to ensure the security of the client services running in the Cloud. In addition, we have reviewed a number of the existing Cloud security approaches and techniques to put a systematic survey of the current security issues in the Cloud environment. Furthermore, we discuss challenges and open problems that these mechanisms face to be effective and efficient.","PeriodicalId":294118,"journal":{"name":"International Journal of Advances in Computer Science and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Concerns from Cloud Security Issues: Challenges and Open Problems\",\"authors\":\"\",\"doi\":\"10.30534/ijacst/2023/0211212023\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of where the data is geographically located at any particular time. So a question arises as to how secure is the data contained in the Cloud. To help address this question, clients of the Cloud should be given the ability to assess the effectiveness of the Cloud’s security measures. Other concerns include unwarranted and unauthorized stoppage of clients’ services in the Cloud, breach of security measures, and disruption to service availability. In this article, perspectives from Cloud computing practitioners are shown to help address clients concerns and bring about awareness of the measures put in place to ensure the security of the client services running in the Cloud. In addition, we have reviewed a number of the existing Cloud security approaches and techniques to put a systematic survey of the current security issues in the Cloud environment. Furthermore, we discuss challenges and open problems that these mechanisms face to be effective and efficient.\",\"PeriodicalId\":294118,\"journal\":{\"name\":\"International Journal of Advances in Computer Science and Technology\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Advances in Computer Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30534/ijacst/2023/0211212023\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advances in Computer Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30534/ijacst/2023/0211212023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

云已经成为计算领域的一个重要话题;然而,这一趋势引发了一系列需要解决的安全问题。例如,数据所有者可能会担心,因为数据和相关软件不在他们的控制之下,而是由云拥有。此外,数据所有者可能不知道数据在任何特定时间的地理位置。因此,一个问题出现了,云中的数据有多安全。为了帮助解决这个问题,应该让云的客户能够评估云安全措施的有效性。其他问题包括客户在云中服务的无保证和未经授权的停止、安全措施的破坏以及服务可用性的中断。在本文中,云计算从业人员的观点将帮助解决客户关注的问题,并使客户了解为确保在云中运行的客户服务的安全性而采取的措施。此外,我们还回顾了一些现有的云安全方法和技术,以系统地调查当前云环境中的安全问题。此外,我们还讨论了这些机制为有效和高效所面临的挑战和开放问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Concerns from Cloud Security Issues: Challenges and Open Problems
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of where the data is geographically located at any particular time. So a question arises as to how secure is the data contained in the Cloud. To help address this question, clients of the Cloud should be given the ability to assess the effectiveness of the Cloud’s security measures. Other concerns include unwarranted and unauthorized stoppage of clients’ services in the Cloud, breach of security measures, and disruption to service availability. In this article, perspectives from Cloud computing practitioners are shown to help address clients concerns and bring about awareness of the measures put in place to ensure the security of the client services running in the Cloud. In addition, we have reviewed a number of the existing Cloud security approaches and techniques to put a systematic survey of the current security issues in the Cloud environment. Furthermore, we discuss challenges and open problems that these mechanisms face to be effective and efficient.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信