|
|
security implications and requirements (cloud environment)
|
|
|
DOR
|
20.1001.2.9515121601.1395.1.1.2.1
|
نویسنده
|
lashkaripour zeinab
|
منبع
|
كنفرانس بين المللي پژوهش در نوآوري و فناوري - 1395 - دوره : 1 - اولین کنفرانس بین المللی پژوهش در نوآوری و فناوری - کد همایش: 95151-21601
|
چکیده
|
A third-party cloud environment is responsible for providing an on demand, elastic, cost effective and easy to manage service through the internet. day by day the number of organizations or even individuals that switch to this novel information system is increasing which would require different levels of demands. in spite of having a broad number of advantages there are some issues and requirements that need a thorough inspection. amongst them are security issues that are related to confidentiality, integrity and availability of assets on either side of the cloud system. so, as to be successful in preserving the security of the cloud environment it is vital to be aware of the security implications, attack and requirements therefore, in this paper we have tried to specify these aspects of a cloud system. the results indicate that the variety of technologies used in a cloud computing environment lead to a broad number of security requirements that need careful inspection.
|
کلیدواژه
|
security ,cloud environment
|
آدرس
|
velayat university, iran
|
پست الکترونیکی
|
z.lashkaripour@velayat.ac.ir
|
|
|
|
|
|
|
|
|
Security Implications and Requirements (Cloud Environment)
|
|
|
Authors
|
Lashkaripour Zeinab
|
Abstract
|
A third-party cloud environment is responsible for providing an on demand, elastic, cost effective and easy to manage service through the internet. Day by day the number of organizations or even individuals that switch to this novel information system is increasing which would require different levels of demands. In spite of having a broad number of advantages there are some issues and requirements that need a thorough inspection. Amongst them are security issues that are related to confidentiality, integrity and availability of assets on either side of the cloud system. So, as to be successful in preserving the security of the cloud environment it is vital to be aware of the security implications, attack and requirements therefore, in this paper we have tried to specify these aspects of a cloud system. The results indicate that the variety of technologies used in a cloud computing environment lead to a broad number of security requirements that need careful inspection.
|
Keywords
|
|
|
|
|
|
|
|
|
|
|
|