首页> 外文期刊>International journal of computing & information technology >A Novel Study of Cloud Computing and its Security
【24h】

A Novel Study of Cloud Computing and its Security

机译:A Novel Study of Cloud Computing and its Security

获取原文
获取原文并翻译 | 示例
       

摘要

The only hurdle in wide adoption of cloud computing is security absence. Security issues are like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide popular acceptance www has raised security risks along with the enormous benefits, so is the case with cloud computing. The boom in cloud computing has brought number of challenges for the consumers and service providers regarding security. This paper presents ways to initiate service providers to create safer clouds by simply securing cloud computing servers, inputting a security scanner before saving onto a cloud and finally before accessing a cloud, the use of a password or key to enter your cloud account. This password may be advanced such as bio-metric scanners such as finger-print scanners already used on most mobile devices and is found to be a safe way to store data on a device like a hard-drive. To counter these problems, such as lack of network, this disrupts a server linking onto a cloud computing server because of lack of network coverage etc. This can cause a cloud to lose all of its information and sadly its stored data as a cloud server might depict a system crashing, (which can cause all stored data to delete, if the cloud user has not saved its data onto the cloud server) the best way is if the service providers of a cloud and also its users work with each other to achieve ultimate security. The best thing for a user is to report issues regarding cloud to their service providers (cloud and also their internet providers). The solution for network availability is simply the creation and viability of internet service providers to cloud service providers. Internet and data service providers need to find a way to control issues and apply various techniques to prevent loss of signal, such as improve their coverage in areas hard to reach and provide more concise network signal coverage in urban areas. For example a signal enhancer in hard to reach areas such as rural areas called network enhancers. This is done by getting the attention of a user by giving the wrong impression and then making the user aware of his mistakes. This will require an advance algorithm from computer programmers but it can be done.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号