Network and Information Security of Cloud Computing Services
نویسندگان
چکیده
منابع مشابه
Cloud Computing and Information Security
The article takes into account cloud computing and information security. It is shown, that in spite of the advantage from costs point of view the data placed within the cloud are still not safe, due to the fact that providers are not able to secure data from physical point of view. So the customers have not physical control of theirs data. Existing standard activities cloud for data security do...
متن کاملInformation Security of Cloud Computing for Enterprises
Cloud computing has become one of the most significant information security issues in recent years. That is due to the dramatically emerging applications and required services of cloud computing. However, in order to safely utilize and enjoy the benefit of cloud computing through wired/wireless networking, sufficient assurance of information security such as confidentiality, authentication, non...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملCloud Computing: Network Security in E- Banking
Cloud computing is clearly one of today’s most enticing technology areas due, at least in part, to its costefficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing as a new IT procurement model. It gives a summary of Clo...
متن کاملCloud Computing Security in Business Information Systems
Cloud computing providers‘ and customers‘ services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hadtudományi Szemle
سال: 2020
ISSN: 2060-0437,2676-9816
DOI: 10.32563/hsz.2020.2.4