{"title":"云计算的进展:云中的安全问题和挑战","authors":"Nooh Bany Muhammad, Mariam Bazzi","doi":"10.1109/ICICT55905.2022.00027","DOIUrl":null,"url":null,"abstract":"In the era of modern technology, the current trend is cloud computing, “the practice of using the cloud.” Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002–2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advances in Cloud Computing: Security Issues and Challenges in the Cloud\",\"authors\":\"Nooh Bany Muhammad, Mariam Bazzi\",\"doi\":\"10.1109/ICICT55905.2022.00027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the era of modern technology, the current trend is cloud computing, “the practice of using the cloud.” Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002–2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.\",\"PeriodicalId\":273927,\"journal\":{\"name\":\"2022 5th International Conference on Information and Computer Technologies (ICICT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Information and Computer Technologies (ICICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT55905.2022.00027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT55905.2022.00027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advances in Cloud Computing: Security Issues and Challenges in the Cloud
In the era of modern technology, the current trend is cloud computing, “the practice of using the cloud.” Nowadays, most of the people in the world have already utilized the cloud. The cloud is a virtual storage place where people can store, share and run their data thus making it a place to protect. Back when it first started out, the primary two companies that used cloud computing first were Amazon and Google back in 2002–2009. At that time, the cloud's security level was not that sophisticated thus made it vulnerable to attacks. As time passes, people tried solving these issues and have leveled up the defense in the cloud. This paper will discuss cloud security levels from many different aspects to evaluate the secureness of the cloud in general. It will compare the different types of clouds and cloud services. It will also discuss different security risks and challenges across different cloud services.