مشخصات مقاله | |
ترجمه عنوان مقاله | راه حل ها و چالش های امنیتی محاسبات ابری-یک بررسی |
عنوان انگلیسی مقاله | Cloud computing security challenges & solutions-A survey |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 10 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | کامپیوتر |
گرایش های مرتبط | محاسبات ابری، امنیت اطلاعات، معماری سیستم های کامپیوتری |
نوع ارائه مقاله |
کنفرانس |
کنفرانس | هشتمین کنفرانس و کارگاه سالانه محاسبات و ارتباطات – 8th Annual Computing and Communication Workshop and Conference |
دانشگاه | Department of Computer Science & Engineering. IEM Institute of Engg. & Management Kolkata, India |
کلمات کلیدی | رایانش ابری، مجازی سازی، امنیت داده ها |
کلمات کلیدی انگلیسی | Cloud computing، Virtualization، Data security |
شناسه دیجیتال – doi |
https://doi.org/10.1109/CCWC.2018.8301700 |
کد محصول | E13101 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
I- Introduction II- Cloud Properties and Models III- Cloud Security Issues/Requirements IV- Proposed Solutions or Methodologies V- Least Explored Areas of Cloud Security References |
بخشی از متن مقاله: |
Abstract Cloud Computing and its’ related security issues as well as countermeasures are one of the highly debated topics in today’s research field. Though, various surveys regarding Cloud security are already prevalent, there remains a certain gap between the proper mapping of these issues to their corresponding solutions. Some surveys present the Virtualization issues and solutions while other deal with the access control mechanisms, but what lacks is a common framework that would at the same time generalize the concept of cloud security as well as intricately analyze its’ specific requirements. Moreover, countermeasures that are provided in a survey must clearly depict the issue that it is handling. Keeping all these factors in mind this survey paper has been designed so as to cover the necessary areas with a proper interconnection between them and lastly discuss a set of open problems in this domain. INTRODUCTION Cloud reflects the concept of a distributed system comprising of a group of virtual machines that can be dynamically provisioned to meet the varying resource requirements of a customer [1] and the entire base of this Cloud-Customer relationship is governed by the SLA (Service Level Agreement). The National Institute of Standards and Technology (NIST) defines Cloud as a model that enables convenient on-demand network access to a shared pool of configurable computing resource e.g. network, storage, hardware, applications, etc. that can be rapidly allocated, scaled as well as released with minimum management effort or service provider intervention[2]. Cloud relieves the user of the overhead of physical installation and maintenance of her system, which automatically reduces the overall cost and enhances the system efficiency. Embracement of Cloud based services results in introduction of an abstraction layer between the physical storage or servers and the user whose data or services are being processed in the Cloud. The present scenario is such that the Cloud consumer who can be the data or service owner has to rely completely on the Cloud Service Provider (CSP) for the privacy and security of her information. |