blog




  • Essay / Security Issues in Cloud Computing - 1875

    Security Issues in Cloud ComputingIntroductionThe first ENIAC computer was invented by Charles Babbage in the 18th century. But the real technological advancement of computers came with the invention of the first four-bit microprocessor in 1971. From 1971 to date, during these 40 years, many operating systems have emerged (such as Windows 95 , Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages ​​and web languages ​​have emerged (such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many multinational companies have emerged (such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many others). But the Internet is one of the keys to the growth of all of the above. Cloud computing is an emerging concept in which IT infrastructure resources are provided over the Internet [1]. Cloud computing is a concept in which every device is connected to the cloud which contains an application, platform or infrastructure or a mix of these. People in the 21st century are more familiar with smartphones than anything else. With the advent of phones such as iPhone and Android smartphones, the number of people using the cloud is increasing significantly. Millions of people are using the cloud today and it is equally important to ensure the security of everyone using it. Cloud computing can be used as a utility to attract many people, which can make the software as a service attractive [2]. There are several security-related issues related to the cloud that can be addressed in this document. Cloud Computing Service Models The p...... middle of the document .......N.; Bamiah, MA; Chuprat, S.; Ab Manan, J.-L., "Towards an efficient and secure educational platform on cloud infrastructure", Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, vol., no., pp.145,150 , December 8-10, 2012doi: 10.1109/ICCCTAM.2012.6488088keywords: {cloud computing; educational computing; data security; trusted computing; EEP; ESEP; ICT; SECaaS; TVD; cloud computing; cloud infrastructure; effective educational platform; intrusion detection tool; open access global technology; secure educational platform; security as a service; security tool; trusted platform module; trusted virtual domain; vTPM; Virtual TPM; Cloud Computing; Effective and secure educational platform; SECaaS; Security and trust issues; TPM; TVD; vTPM},URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6488088&isnumber=6488050