A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
نویسندگان
چکیده
منابع مشابه
A Survey on Cloud Computing Security Threats and Vulnerabilities
Cloud computing is using internet the connected computers share the resources, software information and other devices on-demand, from the resource pool of the cloud providers. The main thing that grabs the organizations to adapt the cloud technology is cost reduction through optimized and efficient computing. Though the cloud computing has its advantages many IT companies have expresses concern...
متن کاملA Survey on Cloud Computing Security, Challenges and Threats
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has as...
متن کاملA survey on top security threats in cloud computing
Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a signific...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Survey of Wireless Mesh Networking Security Technology and Threats
This paper will summarize the technologies and challenges related to wireless mesh networks. With the latest technologies in wireless LAN with WPA and 802.11i, enterprise deployments have finally begun to embrace wireless access networks. Wireless LAN technology has often been approached cautiously in enterprise deployments, partly due to well-known and easily exploitable attacks on early 802.1...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2013
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2013.7.6.03