Research on data access security agent technology in cloud computing security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

The Research of Data Security Mechanism Based on Cloud Computing

With the wide use of cloud computing services, users require higher and higher security. So the safety of cloud computing is the first consideration of users to choose. In the development of cloud computing, the application proportion of virtualization gradually increase, the scope and depth of the safety gradually expand. The related concepts of cloud computing and development situation are in...

متن کامل

Access Control Based Data Security in Cloud Computing

Cloud Computing is mainly about offering services on pay per user basis. It provides Storage-as-aService, where data owner can store their data in the cloud. Data is biggest asset to an organization and how confidentiality, authentication and access control can be outsourced. There is a threat to data owner that if CSP (Cloud Service Provider) is malicious or has some vulnerability. This paper ...

متن کامل

Cloud Computing: Secure and Scalable Data Access Security Models

Cloud computing has built up itself as a standout amongst the most famous advancements accessible presently. It has increased much veneration, yet with fast usage of cloud computing, the security factor has come to forefront. Organizations are pushing toward cloud computing for getting advantage of its cost lessening and versatility highlights. However cloud computing has potential risks and vu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2020

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1693/1/012013