مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

95
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

44
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

The Latest Classification of Cloud Computing Security Issues: Challenges, Attacks and Solutions

Pages

  111-127

Abstract

 cloud computing has revolutionized internet service with its advent. in cloud computing, security is the most important goal and the main requirement of a system. as cloud computing develops, a set of security problems appears. security problems are a strong obstacle to the adaptation of users to cloud computing systems. cloud security is becoming a key distinction and competitive advantage between cloud providers. this paper presents some cloud computing systems and analyzes the problem of cloud computing and its strategy with regard to the concepts and features of cloud computing. this paper tries to provide a comprehensive overview of cloud computing security and some of the key research challenges of cloud computing security. in this paper, the latest and most important cloud security issues such as data security, data secrecy, program security and challenges, attacks and solutions to deal with them with the development of cloud computing have been discussed. in the end, special security issues including the identity of access credit, development of insecure software, and third- party sources were investigated.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button