A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Cloud Computing Security Threats and Vulnerabilities

Cloud computing is using internet the connected computers share the resources, software information and other devices on-demand, from the resource pool of the cloud providers. The main thing that grabs the organizations to adapt the cloud technology is cost reduction through optimized and efficient computing. Though the cloud computing has its advantages many IT companies have expresses concern...

متن کامل

A Survey on Cloud Computing Security, Challenges and Threats

Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has as...

متن کامل

A survey on top security threats in cloud computing

Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a signific...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

A Survey of Wireless Mesh Networking Security Technology and Threats

This paper will summarize the technologies and challenges related to wireless mesh networks. With the latest technologies in wireless LAN with WPA and 802.11i, enterprise deployments have finally begun to embrace wireless access networks. Wireless LAN technology has often been approached cautiously in enterprise deployments, partly due to well-known and easily exploitable attacks on early 802.1...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2013

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2013.7.6.03