云计算应用:研究挑战与机遇

Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian
{"title":"云计算应用:研究挑战与机遇","authors":"Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian","doi":"10.1109/ICSCDS53736.2022.9760887","DOIUrl":null,"url":null,"abstract":"In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Cloud Computing Application: Research Challenges and Opportunity\",\"authors\":\"Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian\",\"doi\":\"10.1109/ICSCDS53736.2022.9760887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.\",\"PeriodicalId\":433549,\"journal\":{\"name\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCDS53736.2022.9760887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCDS53736.2022.9760887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

在一个具有密集计算服务并需要最佳解决方案的世界中,云安全是一个关键问题。众所周知,云计算是一个多样化的领域,其中数据至关重要,因此,它邀请黑暗世界进入并对云计算促进的企业,政府和技术造成虚拟威胁。本文介绍了云计算的基础知识,以及各种应用程序中的安全性和威胁。本研究将通过列出一些云应用程序,探讨安全如何成为全球云用户的潜在风险。本文回顾了一些可以帮助我们分析云安全威胁的可行解决方案和安全措施。分析的解决方案包括对如何使解决方案在每个场景中更有影响力的深刻分析思考。有几种云安全解决方案可以帮助企业降低成本并增强安全性。本研究发现,如果不拖延地考虑风险,那么解决方案的问题将被分为四个支柱,这将有助于我们获得更全面的知识。可见性、基于计算的安全性、网络保护和最后的身份安全性被称为四大支柱。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cloud Computing Application: Research Challenges and Opportunity
In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信