2018
DOI: 10.24237/djps.1401.205c
|View full text |Cite
|
Sign up to set email alerts
|

Storage Architecture for Network Security in Cloud Computing

Abstract: Cloud Computing is seen as greatly accessible computing resources as an outward service granted from the world wide web. As an economical view, the cloud computing key is that consumers are free to use whatever they want, and pay for the services they want. The accessibility of the resources from the cloud is obtainable whenever users want and wherever they are. Therefore, users are free to purchase the IT service that they want and they do not have to be concern more about the manner that maintainable things … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A two-factor authentication confirmation will occur when the thief plays one of the two keys since he will need the other key. This means that performing a two-factor authentication on the door [10]. Nonetheless, the door locks can be broken without a key when the technology is used.…”
Section: Methods Of Authenticationmentioning
confidence: 99%
“…A two-factor authentication confirmation will occur when the thief plays one of the two keys since he will need the other key. This means that performing a two-factor authentication on the door [10]. Nonetheless, the door locks can be broken without a key when the technology is used.…”
Section: Methods Of Authenticationmentioning
confidence: 99%
“…Identification of cloud security issues entails locating the vulnerabilities by looking at the key technologies connected to the cloud's properties and usage scenarios [18]. Additionally, the activity of…”
Section: Cloud Security Identificationmentioning
confidence: 99%
“…The data storage model is computing which considers as a web-based generation which utilizes remote servers. Author gives new designing for the information security storage construction where information encrypted and divided into many blocks and distributed between services suppliers instead of relying on one supplier for information storage [16].…”
Section: Literature Reviewmentioning
confidence: 99%