مقاله انگلیسی رایگان در مورد مشکلات و راه حل امنیت داده در محاسبات ابری – الزویر 2018

 

مشخصات مقاله
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 7 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
منتشر شده در نشریه الزویر
نوع مقاله ISI
عنوان انگلیسی مقاله Exploring Data Security Issues and Solutions in Cloud Computing
ترجمه عنوان مقاله جست و جوی مشکلات و راه حل های امنیت داده در محاسبات ابری
فرمت مقاله انگلیسی  PDF
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط رایانش ابری، امنیت اطلاعات
مجله علوم کامپیوتر پروسیدیا – Procedia Computer Science
دانشگاه School of ICT – IBTE JB Campus – MOE – Kuala Belait – Brunei
کلمات کلیدی محاسبات ابری؛ امنیت داده ها؛ خدمات ابر، محرمانه بودن؛ تمامیت؛ دسترسی؛ تأیید هویت و کنترل دسترسی
کلمات کلیدی انگلیسی  Cloud Computing; Data Security; Cloud Services; Confidentiality; Integrity; Availability; Authentication and Access Control
کد محصول E7120
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
1. Introduction

According to National Institute of Standards and Technology (NIST), “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort and or service provider interaction” [1]. Cloud computing is one of the fastest emerging technologies in Computing. Everyone is using cloud computing in our day to day life in one form or another without realizing it, like Microsoft Office 365, Gmail and Dropbox etc. There are many advantages of using cloud computing such as anytime-anywhere accessibility, better geographic coverage with the fastest time, less investment on infrastructure, etc., but there are also challenges using cloud computing like data security, lack of resources and expertise etc. Among the challenges, data security stands very tall and this paper explores the challenges of data security in cloud computing and provides methodologies to overcome the data security challenges. This paper is organized as follows. Section 2 introduces the cloud computing model. Section 3 provides different challenges in data security and provides solutions to the challenges. Section 4 concludes this paper with new developments and challenges in cloud computing.

2. Cloud Computing

Model There are five major actors [1] in cloud computing based on their participation as shown in Fig. 1. Cloud consumer or cloud service consumer (CSC) is the one who gets the service from a cloud provider and pays for the service as per the use. Cloud provider or cloud service provider (CSP) is the one who provides the cloud services to the CSC. Cloud auditor is the one who conducts an independent assessment of cloud services, information system operations, performance and security of the cloud implementations. Cloud broker is the one who interacts between CSP and CSC to make the business happen. Cloud carrier is the one who provides the connectivity and cloud services from CSP to CSC. NIST based cloud computing model consists of four cloud deployment models, three service delivery models and five essential characteristics. A Cloud can be deployed as Private, Public, Community and Hybrid clouds. Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) are the three service delivery models have become widely recognized and formalized. Rapid Elasticity, Measured Service, Resource Pooling, Broad Network access and On-Demand Self Service are the five essential characteristics of cloud computing [1, 2 & 3]. Other researchers [4, 5 & 6] says that multi-tenancy is also an important characteristic of cloud computing. The following table 1 shows that a cloud computing delivery model can provide nine services, namely Application, Data, Runtime, Middleware, Operating System, Virtualization, Server, Storage and Networking which are the components in the traditional computing [7, 8, 4].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا