>
Fa   |   Ar   |   En
   Security Implications and Requirements (Cloud Environment)  
   
DOR 20.1001.2.9515121601.1395.1.1.2.1
نویسنده Lashkaripour Zeinab
منبع كنفرانس بين المللي پژوهش در نوآوري و فناوري - 1395 - دوره : 1 - اولین کنفرانس بین المللی پژوهش در نوآوری و فناوری - کد همایش: 95151-21601
چکیده    A third-party cloud environment is responsible for providing an on demand, elastic, cost effective and easy to manage service through the internet. day by day the number of organizations or even individuals that switch to this novel information system is increasing which would require different levels of demands. in spite of having a broad number of advantages there are some issues and requirements that need a thorough inspection. amongst them are security issues that are related to confidentiality, integrity and availability of assets on either side of the cloud system. so, as to be successful in preserving the security of the cloud environment it is vital to be aware of the security implications, attack and requirements therefore, in this paper we have tried to specify these aspects of a cloud system. the results indicate that the variety of technologies used in a cloud computing environment lead to a broad number of security requirements that need careful inspection.
کلیدواژه Security ,Cloud Environment
آدرس Velayat University, Iran
پست الکترونیکی z.lashkaripour@velayat.ac.ir
 
   Security Implications and Requirements (Cloud Environment)  
   
Authors Lashkaripour Zeinab
Abstract    A third-party cloud environment is responsible for providing an on demand, elastic, cost effective and easy to manage service through the internet. Day by day the number of organizations or even individuals that switch to this novel information system is increasing which would require different levels of demands. In spite of having a broad number of advantages there are some issues and requirements that need a thorough inspection. Amongst them are security issues that are related to confidentiality, integrity and availability of assets on either side of the cloud system. So, as to be successful in preserving the security of the cloud environment it is vital to be aware of the security implications, attack and requirements therefore, in this paper we have tried to specify these aspects of a cloud system. The results indicate that the variety of technologies used in a cloud computing environment lead to a broad number of security requirements that need careful inspection.
Keywords
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved