• English
    • العربية
عرض المادة 
  •   الرئيسية
  • المجلات العلمية
  • مجلة التربوي
  • - 21 - العدد الحادي والعشرون
  • عرض المادة
  •   الرئيسية
  • المجلات العلمية
  • مجلة التربوي
  • - 21 - العدد الحادي والعشرون
  • عرض المادة
JavaScript is disabled for your browser. Some features of this site may not work without it.

استعرض

جميع محتويات المستودعالمجتمعات & الحاوياتحسب تاريخ النشرالمؤلفونالعناوينالمواضيعهذه الحاويةحسب تاريخ النشرالمؤلفونالعناوينالمواضيع

حسابي

دخول تسجيل

Cloud Computing Security Issues and Solutions

Thumbnail
عرض/افتح
Cloud Computing Security Issues and Solutions (1.909Mb)
التاريخ
2022-07
المؤلف
Tawer, Kamal
Yahya, Abdusalam
Amir, Munayr Mohammed
واصفات البيانات
عرض سجل المادة الكامل
الخلاصة
Cloud Computing is constantly emerging as a major commercial infrastructure, since it does not require businesses to maintain expensive computing hardware. This not only reduces overall cost of capital, but also eliminates the maintenance costs spent by traditional businesses to keep their computing infrastructure up and running. A prime benefit of this technology is that it gives access to the same set of shared resources to a larger user base that has different user-requirements. It does so by means of virtualization. Hence, cloud computing holds a great deal of significance for businesses and enterprises, whether they are technology-based or consumer based. The paper highlighted several problems and complications that could arise in Cloud computing and cause severe damage to the data security, physical security, logical security and administrative security. The paper explores several problems/issues that could arise in Cloud computing including data security issues, logic security and administrative security issues. The paper evaluates several solutions in the areas of Cloud computing including Cryptography-based solutions, data Partitioning-based solutions, multi-agent based solutions and machine-learning solution. These solutions in Cloud computing ensures data is completely safe and protected from unauthorized access by using Cloud Computing technology for individual use and industrial use.
المكان (URI)
http://dspace.elmergib.edu.ly/xmlui/handle/123456789/1341
حاويات
  • - 21 - العدد الحادي والعشرون

دعم وتنفيذ: مركز تقنية المعلومات بجامعة المرقب
اتصل بنا | ارسال ملاحظة
 

 


دعم وتنفيذ: مركز تقنية المعلومات بجامعة المرقب
اتصل بنا | ارسال ملاحظة