2017
DOI: 10.4172/2165-7866.1000216
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Issues in Cloud Computing Environment

Abstract: Cloud computing turned into the most predominant innovation in recent years. This innovative technology provides services to the customers for software and hardware. One can state that distributed computing can blast the portable business. Cloud computing is a basic technology for sharing of resources on the internet. Virtualization is a central innovation for empowering cloud resource sharing. Confidentiality of data storage is the essential alarm for assurance of data security so cloud computing does not pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Trusting the Cloud Service Provider and their offerings is one of the strongest driving forces behind the decision of a user to move into a cloud system or continue with the legacy system [9]. Trust is based on the assessment as to whether a provider has covered all the risks, including areas of data security, VM security as well as other government and compliance issues.…”
Section: Cloud Computing Challengesmentioning
confidence: 99%
“…Trusting the Cloud Service Provider and their offerings is one of the strongest driving forces behind the decision of a user to move into a cloud system or continue with the legacy system [9]. Trust is based on the assessment as to whether a provider has covered all the risks, including areas of data security, VM security as well as other government and compliance issues.…”
Section: Cloud Computing Challengesmentioning
confidence: 99%
“…Cloud computing resources are distributed among the users based on the virtualization concept. Different remote environments are collected, grouped, and used full resources to their capability 5,6 . Cloud Service Providers (CSP) present this management with the modified Service Level Agreements (SLAs) that distinguish the needed Quality of Service (QoS) parameters of the users 7 .…”
Section: Introductionmentioning
confidence: 99%
“…Different remote environments are collected, grouped, and used full resources to their capability. 5,6 Cloud Service Providers (CSP) present this management with the modified Service Level Agreements (SLAs) that distinguish the needed Quality of Service (QoS) parameters of the users. 7 However, the venture on various assets: software and hardware, is minimized by distributed computing and allows the resources to be discharged and leased.…”
Section: Introductionmentioning
confidence: 99%