Investigate the role of security in choosing cloud computing and a combination of security solutions

سال انتشار: 1399
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 270

فایل این مقاله در 7 صفحه با فرمت PDF و WORD قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CMECE03_033

تاریخ نمایه سازی: 16 اسفند 1399

چکیده مقاله:

We will first give a brief overview of cloud computing and a look at its history, as well as the role of security in the pervasiveness of this technology. Because many companies are very interested in using this technology, but the security of the information they put on the cloud is very important and vital for them, so the most important barrier to this technology is security. Factors such as: "Internal threats" occur by authenticated users and disclose information (external threats) by external attackers and do things such as change the network address. Access to accounts endangers the security of cloud computing. In this article, we review the methods that can ensure the security of this technology against the mentioned threats to a significant level. Finally, we will discuss whether to say yes to cloud computing or not>

کلیدواژه ها:

نویسندگان

AmirHossein Parandin,

Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Razi University

Masoumeh Bagheri

Student of Computer Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Payame Noor University

MohammadJavad Shahsavari

Student of Electronic Engineering, Department of Electrical and Computer Engineering, Iran,Kermanshah, Technical and Vocational University

Ahmad Ostovar

Student of English Language and Literature, Department of Literature and Humanities, Iran,Kermanshah, Razi University