2022
DOI: 10.32604/cmc.2022.020213
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Service for Identifying Unauthorized User Behaviour

Abstract: Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system's virtualizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 16 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…These policies cover a broad spectrum of topics, from user authentication, which could involve multi-factor authentication methods as seen in companies like Google and Microsoft, to data encryption, mirroring practices used by organizations like Apple to secure user data. Network access control is another critical area, akin to the systems used by Amazon Web Services to manage and monitor access to its cloud resources [18]. Incident response protocols are also integral, similar to the rapid response measures employed by Facebook during data breach incidents [19].…”
Section: The Essence Of Security Policiesmentioning
confidence: 99%
“…These policies cover a broad spectrum of topics, from user authentication, which could involve multi-factor authentication methods as seen in companies like Google and Microsoft, to data encryption, mirroring practices used by organizations like Apple to secure user data. Network access control is another critical area, akin to the systems used by Amazon Web Services to manage and monitor access to its cloud resources [18]. Incident response protocols are also integral, similar to the rapid response measures employed by Facebook during data breach incidents [19].…”
Section: The Essence Of Security Policiesmentioning
confidence: 99%
“…The expenditures are going up in line with the increased frequency of the occurrence of it. Parkinson's disease is expected to cost the global economy a total of 604 billion dollars in 2010 [2]. It is estimated that more than 131 million people will be living with Parkinson's disease by the year 2030, which would result in global healthcare costs of $2 trillion.…”
Section: Introductionmentioning
confidence: 99%