Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian
{"title":"云计算应用:研究挑战与机遇","authors":"Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian","doi":"10.1109/ICSCDS53736.2022.9760887","DOIUrl":null,"url":null,"abstract":"In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Cloud Computing Application: Research Challenges and Opportunity\",\"authors\":\"Anurag Karmakar, Anaswara Raghuthaman, Om Sudhakar Kote, N. Jayapandian\",\"doi\":\"10.1109/ICSCDS53736.2022.9760887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.\",\"PeriodicalId\":433549,\"journal\":{\"name\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCDS53736.2022.9760887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCDS53736.2022.9760887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Computing Application: Research Challenges and Opportunity
In a world with intensive computational services and require optimal solutions, cloud security is a critical concern. As a known fact, the cloud is a diverse field in which data is crucial, and as a result, it invites the dark world to enter and create a virtual menace to businesses, governments, and technology that is facilitated by the cloud. This article addresses the fundamentals of cloud computing, as well as security and threats in various applications. This research study will explore how security is remaining as a potential risk for cloud users across the globe by listing some of the cloud applications. Some viable solutions and security measures that could help us in analyzing cloud security threats are reviewed. The analyzed solutions include profound analytical thinking on how to render the solutions more impactful in each scenario. Several cloud security solutions are available to assist businesses in reducing costs and enhancing security. This study discover that if the risks are taken into consideration without any delay then the matter of solutions gets divided into four pillars, which will assist us in obtaining a more comprehensive knowledge. Visibility, compute-based security, network protection, and lastly identity security are referred as four pillars.