ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Cloud computing is one of the fastest emerging technologies in computing. There are many advantages as well few security issues in cloud computing. This paper explores the different data security issues in cloud computing in a multi-tenant environment and proposes methods to overcome the security issues. This paper also describes Cloud computing models such as the deployment models and the service delivery models. In any business or Cloud Computing data are exceptionally important, data leaking or corruption can shatter the confidence of the people and can lead to the collapse of that business. Currently cloud computing is used directly or indirectly in many businesses and if any data breaching has happened in cloud computing, that will affect the cloud computing as well as the company’s business. This is one of the main reasons for cloud computing companies to give more attention to data security.
4. Conclusion and Future Challenges
The cloud problems are mainly with the security and privacy of the data stored in the cloud. The cloud environments like heterogeneity, resource sharing, multi-tenancy, virtualization, mobile cloud computing and Service Level Agreement (SLA) that makes the cloud security more vulnerable. This paper provides the data security issues and methods to overcome these issues. There are also new developments in cloud computing like Container-as-a-Service (CaaS), Software-defined networking (a concept to design and manage networks that abstracts applications away from the underlying networks), Software-defined-storage (abstracts the logical storage services and capabilities away from the underlying hardware) and Cloud-of-Things (CoT), (a concept combining cloud computing and Internet-of-Things (IoT) for smart city applications). All these new developments bring new challenges in cloud computing and they need to be addressed. When there is a change in technology, always review the security policies and procedures and update accordingly to protect the data and its privacy.