{"title":"回顾云计算中的安全问题和解决方案","authors":"Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar","doi":"10.1080/09720529.2022.2133253","DOIUrl":null,"url":null,"abstract":"Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2149 - 2158"},"PeriodicalIF":1.2000,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Review on security issues and solutions in cloud computing\",\"authors\":\"Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar\",\"doi\":\"10.1080/09720529.2022.2133253\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.\",\"PeriodicalId\":46563,\"journal\":{\"name\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"volume\":\"25 1\",\"pages\":\"2149 - 2158\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/09720529.2022.2133253\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2133253","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Review on security issues and solutions in cloud computing
Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.