Understanding the Determinants of Security and Privacy in Cloud Computing Architecture
Journal: International Journal of Trend in Scientific Research and Development (Vol.3, No. 5)Publication Date: 2019-15-8
Authors : Yin Myo Kay Khine Thaw Khin Myat Nwe Win;
Page : 881-884
Keywords : Distributed Computing; Cloud computing; architecture; challenges; cloud platforms;
Abstract
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
Other Latest Articles
- Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
- Performance Comparison of File Security System using TEA and Blowfish Algorithms
- Effects of Waste Asbestos Cement Sheet on Compressive Strength and Flexural Strength of Concrete
- Microstructural and Mechanical Properties Analysis of Plasma ARC Welded 316L Austenitic Stainless Steel Joints without Addition of Filler Material
- Accelerate the Strength Gaining Properties of Concrete by using Different Cementtitious Materials, Non Chlorides Hardning Acceleraters and Water Curing in Rigid Pavement
Last modified: 2019-09-07 17:46:05