{"title":"云计算:方法、结构和安全","authors":"Varsha Anup Jujare","doi":"10.1109/ICCMC.2018.8487479","DOIUrl":null,"url":null,"abstract":"Cloud computing is a rapidly growing era with assistance of grid computing, distributed computing. This provides tremendous IT services to the customer on the network, according to user’s requirements and on pay for use basis. Actually it is the service provided by third party provider who owns the infrastructure. Users can develop various applications in cloud computing, they can store the data in cloud and can use it anywhere in the world. Only the thing is the data should remain safe in its place, so that security is a major concern in cloud computing. This paper gives detailed information about different challenges in cloud and so various ways used to protect the data from breaches.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"55 1","pages":"124-127"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cloud computing: Approach, Structure and Security\",\"authors\":\"Varsha Anup Jujare\",\"doi\":\"10.1109/ICCMC.2018.8487479\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is a rapidly growing era with assistance of grid computing, distributed computing. This provides tremendous IT services to the customer on the network, according to user’s requirements and on pay for use basis. Actually it is the service provided by third party provider who owns the infrastructure. Users can develop various applications in cloud computing, they can store the data in cloud and can use it anywhere in the world. Only the thing is the data should remain safe in its place, so that security is a major concern in cloud computing. This paper gives detailed information about different challenges in cloud and so various ways used to protect the data from breaches.\",\"PeriodicalId\":6604,\"journal\":{\"name\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"55 1\",\"pages\":\"124-127\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2018.8487479\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487479","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing is a rapidly growing era with assistance of grid computing, distributed computing. This provides tremendous IT services to the customer on the network, according to user’s requirements and on pay for use basis. Actually it is the service provided by third party provider who owns the infrastructure. Users can develop various applications in cloud computing, they can store the data in cloud and can use it anywhere in the world. Only the thing is the data should remain safe in its place, so that security is a major concern in cloud computing. This paper gives detailed information about different challenges in cloud and so various ways used to protect the data from breaches.