메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Muhammad Alyas Shahid (COMSATS Institute of Information Technology) Muhammad Sharif (COMSATS Institute of Information Technology)
저널정보
한국산학기술학회 SmartCR Smart Computing Review 제5권 제6호
발행연도
2015.12
수록면
602 - 616 (15page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Cloud computing a new recently emerged environment for the hosting and delivery of IT services over a network typically includes on-demand, reliable, customized, self service computing environment guarantees dynamic access and quality of service for end users. This computing paradigm introduces many changes with flexible and dynamically scalable pools of often virtualized resources. With these multitudinous benefits and characteristics, a cloud system can prospectively perk up information technology and encourage business to work on, and invest in new alternate computing system. It offers a quick start, flexibility, scalability and cost-effectiveness for hosting and expanding resources but new threats and opportunities for exploitation are introduced requiring essential values and control policies to guide the protection and safety of systems and data. The cloud computing environment also provides opportunities to share resources, information and services among the peoples of the world. With all the advantages of cloud computing, there are a few limitations with respect to data security and quality of service, because this environment brings new security issues, challenges and threats. Management must understand and analyze the risks of this new and emerging paradigm of cloud in order to protect and secure the system, resources and data from exploitation. This paper focuses on cloud computing Security Models, Security Architecture, risks, issues, threats and challenges of security to any cloud computing environment.

목차

Abstract
Introduction
100-Mile Overview
Cloud Computing Security Models
Security Issues & Challenges in the Cloud Computing Environment
Conclusions and Discussion
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2016-505-002246996