Investigate the role of security in choosing cloud computing and a combination of security solutions
سال انتشار: 1399
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 270
فایل این مقاله در 7 صفحه با فرمت PDF و WORD قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CMECE03_033
تاریخ نمایه سازی: 16 اسفند 1399
چکیده مقاله:
We will first give a brief overview of cloud computing and a look at its history, as well as the role of security in the pervasiveness of this technology. Because many companies are very interested in using this technology, but the security of the information they put on the cloud is very important and vital for them, so the most important barrier to this technology is security. Factors such as: "Internal threats" occur by authenticated users and disclose information (external threats) by external attackers and do things such as change the network address. Access to accounts endangers the security of cloud computing. In this article, we review the methods that can ensure the security of this technology against the mentioned threats to a significant level. Finally, we will discuss whether to say yes to cloud computing or not>
کلیدواژه ها:
نویسندگان
AmirHossein Parandin,
Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Razi University
Masoumeh Bagheri
Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Payame Noor University
MohammadJavad Shahsavari
Student of Electronic Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Technical and Vocational University
Ahmad Ostovar
Student of English Language and Literature, Department of Literature and Humanities, Iran,Kermanshah, Razi University