Security techniques in cloud computing.

Autor: Nissar, Soliha, Ahmed, Bilal, Sood, Sonal, Kaur, Bhupinder, Brar, Manbir Kaur
Předmět:
Zdroj: AIP Conference Proceedings; 2024, Vol. 3121 Issue 1, p1-5, 5p
Abstrakt: This term paper points to supply a comprehensive survey of security strategies in cloud computing. It recognizes the centrality of cloud computing as an overwhelming worldview for conveying computing assets by means of the web. It suggests that businesses progressively depend on cloud administrations for their computing needs. It emphasizes that the developing selection of cloud administrations has brought around significant security concerns. This sets the stage for the most center of the term paper, which is to address these security challenges. It extreme to investigate the particular dangers and vulnerabilities that are interesting to cloud situations. It promises to offer a thorough analysis of security techniques that are currently in use within cloud computing. This analysis will likely encompass various strategies, technologies and best practices employed to protect data, applications, and the cloud infrastructure itself. It suggests that the research will also identify and evaluate inefficient solutions that may exist in the literature. This indicates that the paper will critically assess existing security approaches and potentially highlight areas where improvements are needed. Lastly, it hints at the paper's goal to provide recommendations for implementing a secure and adaptive cloud environment. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index