...
首页> 外文期刊>Network Protocols and Algorithms >Security Mapping of a Usage Based Cloud System
【24h】

Security Mapping of a Usage Based Cloud System

机译:基于使用情况的云系统的安全性映射

获取原文
           

摘要

The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.
机译:云计算技术的普及正在迅速增加。对于云的数据存储和数据转换技术的有效性没有分歧。此前,它仅将分布式计算用于共享资源。但是,随着技术的进步,云计算在各种业务领域中变得越来越强大,也越来越具有适应性。但是,随着用户数量的增加,影响用户隐私,个人数据,身份和机密性的安全威胁也增加了。在本文中,我们旨在基于云的使用类型对安全和隐私威胁进行分类。我们还提出了一种算法,用于根据使用类别找到解决安全和隐私相关问题的适当解决方案。本文有助于提高云技术用户的安全性和隐私性,同时又不影响数据存储的优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号