مباشرة الطلبة للعام الدراسي الجديد              ضوابط الزي الموحد في كلية علوم الحاسوب وتكنولوجيا المعلومات              جدول المحاضرات الأسبوعي لجميع الأقسام العلمية – الفصل الاول – 2021/ 2022              التعليم تطلق استمارة التقديم للقبول المركزي في الجامعات              الى الطلبة الخريجين الأوائل على أقسامهم العلمية

 تفاصيل الخبر

مقال اكاديمي في الحوسبة السحابية

2021-07-07

مقال اكاديمي في الحوسبة السحابية


    RESEARCH ON KEY SECURITY STRATEGIES OF CLOUD COMPUTING

BY

                     Saif Al-din M. Najim         Shokhan M. Al-Barzinji 

  

The platform of Cloud computing is model based on Internet environment which enables an easy on-demand access and usage payment of each access and utilization of pool of networks that is shared among multiple users. This type of computing is considered as another innovation that fulfils users’ needs and requirements for resources of computing like stockpiling, systems, administrations and applications as well as servers. Securing the cloud’s stored Data is seen as one of the significant principles with many challenges and concerns in the research of cloud computing. This study has reviewed the research in a critical manner which focused on the types of cloud computing, industries, deployments and models of delivery. This constant issue is becoming more impactful because of the emerging challenges in cloud computing technology management. From the client’s point of view, the security in cloud computing is hazardous, typically in the matter of assurance affirmation problems and securing the data. These problems create shortcomings that hinder the adoption of cloud computing administrations. This paper inspects and illustrates the critical issues of cloud computing in relation to the privacy and protection on the Cloud. Lastly, this paper is concluded with a review to the literature stated as well suggesting on-going future studies. Keywords: Cloud computing, Data security, Data privacy, Cloud Cryptography, Security threats.

 

References:

REFRENCES: [1] Mell P, Grance T. The NIST definition of cloud computing. 2011.

[2] Nemati H, Singhvi A, Kara N, El Barachi M, editors. Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem. Globecom Workshops (GC Wkshps), 2014; of Conference.

[3] Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems.25(6):599- 616,2009.

[4] Ahmed HAS, Ali MH, Kadhum LM, Zolkipli MF, Alsariera YA. A Review of Challenges and Security Risks of Cloud Computing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC).9(1-2):87-91,2017.

[5] Li Q, Wang Z-y, Li W-h, Li J, Wang C, Du R-y. Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterprise Information Systems.7(3):237-71,2013.

 [6] Abbas H, Maennel O, Assar S. Security and privacy issues in cloud computing. Springer,2017.

 [7] Grobauer B, Walloschek T, Stöcker E. Understanding cloud computing vulnerabilities. Security & privacy, IEEE.9(2):50-7,2011.

 [8] Khan N, Al-Yasiri A. Cloud security threats and techniques to strengthen cloud computing adoption framework. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: IGI Global; 2018. p. 268-85.

[9] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications.34(1):1-11,2011.

 [10] Al-Badi A, Tarhini A, Al-Kaaf W. Financial Incentives for Adopting Cloud Computing in Higher Educational Institutions. Asian Social Science.13(4):162,2017.

[11] Catteddu D. Cloud Computing: benefits, risks and recommendations for information security. Web Application Security: Springer; 2010. p. 17- .

 [12] Satyanarayanan M. The emergence of edge computing. Computer.50(1):30-9,2017.

 [13] Ghosh R, Longo F, Frattini F, Russo S, Trivedi KS. Scalable analytics for iaas cloud availability. Cloud Computing, IEEE Transactions on.2(1):57-70,2014.

[14] Guerrero-Contreras G, Garrido JL, BalderasDiaz S, Rodríguez-Domínguez C. A contextaware architecture supporting service availability in mobile cloud computing. IEEE Transactions on Services Computing.10(6):956- 68,2017.

[15] Ge J, Wu Y, Li T, Yuepeng E, Zhang C, editors. Experimenting adaptive services in sea-cloud innovation environment. Computer Communications Workshops (INFOCOM WKSHPS), 

 تعليقات الفيسبوك

 المزيد من الاخبار

 مقال اكاديمي عن العملات الرقمية

 مقال اكاديمي بعنوان تأثير بروتوكولات التوجيه والطبولوجيا على الأنظمة القائمة على إنترنت الأشياء

التصويت

مجموع التصويتات

الاساتذة والاداريين


القسم
اللقب
الاسم


خريجي الكلية

القسم
الشهادة
السنة
النوع
الجنس
الاسم

طلبة الكلية

القسم
المرحلة
الشهادة
النوع
الجنس
الاسم