SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
How secured and safe is Cloud?
Signaler
Partager
IRJET Journal
Fast Track Publications
Suivre
•
0 j'aime
•
2 vues
Ingénierie
https://www.irjet.net/archives/V9/i4/IRJET-V9I438.pdf
Lire la suite
How secured and safe is Cloud?
•
0 j'aime
•
2 vues
IRJET Journal
Fast Track Publications
Suivre
Signaler
Partager
Ingénierie
https://www.irjet.net/archives/V9/i4/IRJET-V9I438.pdf
Lire la suite
How secured and safe is Cloud?
1 sur 3
Télécharger maintenant
Recommandé
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp... par
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
245 vues
•
11 diapositives
Security Issues’ in Cloud Computing and its Solutions. par
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
353 vues
•
6 diapositives
A Comparative Review on Data Security Challenges in Cloud Computing par
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
90 vues
•
6 diapositives
IRJET - Multitenancy using Cloud Computing Features par
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
18 vues
•
4 diapositives
improve cloud security par
improve cloud security
Balkees Shereek
370 vues
•
8 diapositives
Ad4502189193 par
Ad4502189193
IJERA Editor
224 vues
•
5 diapositives
Contenu connexe
Similaire à How secured and safe is Cloud?
Cloud Data Protection for the Masses par
Cloud Data Protection for the Masses
IRJET Journal
29 vues
•
5 diapositives
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities par
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
16 vues
•
4 diapositives
Fog computing document par
Fog computing document
sravya raju
3.4K vues
•
32 diapositives
Fog doc par
Fog doc
priyanka reddy
546 vues
•
37 diapositives
fog computing provide security to the data in cloud par
fog computing provide security to the data in cloud
priyanka reddy
10.7K vues
•
37 diapositives
IRJET- Single to Multi Cloud Data Security in Cloud Computing par
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
44 vues
•
5 diapositives
Similaire à How secured and safe is Cloud?
(20)
Cloud Data Protection for the Masses par IRJET Journal
Cloud Data Protection for the Masses
IRJET Journal
•
29 vues
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities par IRJET Journal
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
•
16 vues
Fog computing document par sravya raju
Fog computing document
sravya raju
•
3.4K vues
Fog doc par priyanka reddy
Fog doc
priyanka reddy
•
546 vues
fog computing provide security to the data in cloud par priyanka reddy
fog computing provide security to the data in cloud
priyanka reddy
•
10.7K vues
IRJET- Single to Multi Cloud Data Security in Cloud Computing par IRJET Journal
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
•
44 vues
Enhanced security framework to ensure data security in cloud using security b... par eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
•
137 vues
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble... par IRJET Journal
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
•
32 vues
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse par IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
•
24 vues
Enhanced security framework to ensure data security par eSAT Publishing House
Enhanced security framework to ensure data security
eSAT Publishing House
•
367 vues
Splendens Project Proposal by Slidesgo.pptx par ssuserea0dfe
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
•
3 vues
Security of Data in Cloud Environment Using DPaaS par IJMER
Security of Data in Cloud Environment Using DPaaS
IJMER
•
636 vues
IRJET- A Survey on SaaS-Attacks and Digital Forensic par IRJET Journal
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
•
45 vues
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage par IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
•
38 vues
An efficient and secure data storage in cloud computing using modified RSA pu... par IJECEIAES
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
•
22 vues
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ... par IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
•
93 vues
IRJET- Survey on Security Threats and Remedies in Cloud Computing par IRJET Journal
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
•
24 vues
Security threat issues and countermeasures in cloud computing par Jahangeer Qadiree
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
•
222 vues
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat... par IRJET Journal
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
•
22 vues
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ... par IIJSRJournal
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
•
12 vues
Plus de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 vues
•
7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vues
•
7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 vues
•
5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vues
•
11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vues
•
6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vues
•
5 diapositives
Plus de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
44 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vues
Dernier
SWM L1-L14_drhasan (Part 1).pdf par
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
48 vues
•
150 diapositives
Plumbing par
Plumbing
Iwiss Tools Co.,Ltd
15 vues
•
14 diapositives
DESIGN OF SPRINGS-UNIT4.pptx par
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
18 vues
•
47 diapositives
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... par
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun
12 vues
•
84 diapositives
CHEMICAL KINETICS.pdf par
CHEMICAL KINETICS.pdf
AguedaGutirrez
8 vues
•
337 diapositives
SEMI CONDUCTORS par
SEMI CONDUCTORS
pavaniaalla2005
20 vues
•
8 diapositives
Dernier
(20)
SWM L1-L14_drhasan (Part 1).pdf par MahmudHasan747870
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
•
48 vues
Plumbing par Iwiss Tools Co.,Ltd
Plumbing
Iwiss Tools Co.,Ltd
•
15 vues
DESIGN OF SPRINGS-UNIT4.pptx par gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
18 vues
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th... par ahmedmesaiaoun
Performance of Back-to-Back Mechanically Stabilized Earth Walls Supporting th...
ahmedmesaiaoun
•
12 vues
CHEMICAL KINETICS.pdf par AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
8 vues
SEMI CONDUCTORS par pavaniaalla2005
SEMI CONDUCTORS
pavaniaalla2005
•
20 vues
_MAKRIADI-FOTEINI_diploma thesis.pptx par fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi
•
7 vues
Object Oriented Programming with JAVA par Demian Antony D'Mello
Object Oriented Programming with JAVA
Demian Antony D'Mello
•
107 vues
Stone Masonry and Brick Masonry.pdf par Mohammed Abdullah Laskar
Stone Masonry and Brick Masonry.pdf
Mohammed Abdullah Laskar
•
20 vues
Design of machine elements-UNIT 3.pptx par gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
29 vues
Solar PV par Iwiss Tools Co.,Ltd
Solar PV
Iwiss Tools Co.,Ltd
•
14 vues
K8S Roadmap.pdf par MaryamTavakkoli2
K8S Roadmap.pdf
MaryamTavakkoli2
•
6 vues
802.11 Computer Networks par TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
9 vues
MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdf
msaucla
•
58 vues
SWM L15-L28_drhasan (Part 2).pdf par MahmudHasan747870
SWM L15-L28_drhasan (Part 2).pdf
MahmudHasan747870
•
28 vues
IWISS Catalog 2022 par Iwiss Tools Co.,Ltd
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
•
26 vues
Saikat Chakraborty Java Oracle Certificate.pdf par SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
15 vues
NEW SUPPLIERS SUPPLIES (copie).pdf par georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou
•
14 vues
fakenews_DBDA_Mar23.pptx par deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
12 vues
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
11 vues
How secured and safe is Cloud?
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 197 How secured and safe is Cloud? Menon Sanoop Govindankutty Student, M. Sc IT, Keraleeya Samajam(Regd.) Dombivli’s Model College, Maharashtra ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing is the one of the hot and high value topic in the IT industry. Cloud computing provide a new method of delivering computing resources. Cloud computing resources includes data storage, processing to software, customer relationship management etc. The goal of cloud computing for private or public is to provide easy andscalable services to the IT industry. In simple words the delivery of software, storage, network, analytics and intelligenceoverthe internet to provide faster, economic and flexible service to the client. Amazon rollout the first kind of cloud in 2006 afterthat many companies like Google, Oracle, Azure, IBM any many provide the cloud services. Services provided by cloud providers are Paas (Platform as a Service), Saas(Softwareasa Service), Iaas (Infrastructure as a Service). Virtualization is the one of the main keyword found in the cloud world. Virtualization is creation of virtual servers, infrastructureand computing. Virtualization is the one of the foundational element in the cloud computing. As all industries are moving into cloud the security is also as important and this research paper is going to check how safe is cloud? Key Words: Cloud computing, Virtualization, Security, AWS, AZURE, IAAS, PAAS, SAAS. 1.INTRODUCTION Cloud computing is a general term for anythingthatinvolves providing the on demand services to end users over the internet. If a individual starts a business at early stage the resources used will be less as the number of employees are hand countable, but as the business grow the need of resources and count of employees increases. For that the system, network, data storage and servers will also be needed for the business. The resources to maintain, planning, security need to be paidsotheexpenseofcompany will also increase as per growth. There will be many un wanted expenses due to resource wastages etc. To solvethis problem cloud computing play a major role. A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people, with certain access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services[1]. Cloud computing allows you to pay only for how much you use with much faster provision.CloudComputingsystem are maintained by the cloud providers so the user doesn’t have to worry about the maintenance 1.1 How Cloud Computing works? Cloud computing heavily depends on Virtualization and automation. This helps users to utilize the services from any where in the world on their system over the internet. The users have to pay only to the services they are using instead of spending a large amount of money in the implementation and maintaining thesetupbythemselves.Theycanaccessthe data, servers sitting anywhere in the world. 2. TYPES OF CLOUD COMPUTING SERVICES. Cloud computing services are divided in to three categories Iaas- It stands for Infrastructure as a Service. Iaas provides computing architecture and infrastructure. Data storage, virtualization, servers and networking are taken care by the providers and is managed by the user application, middleware and data. Vendors manageaboveresources.Iaas is used by system administrators. Pros of Iaas is cloud provides the infrastructure,enhancedscalabilityandflexible. But the issue faced for the Iaas is service delays, network delays and security delays. Paas- It stands for Platform as a service. In Pass the services provided are Programming language, Operating system, Server and Database. It provides with encapsulation.Andthe user can build, compile and run programs. This services are managed by the users they manage data and application resources. This service is used by the developers. Common PaaS products include Salesforce's Lightning Platform, AWS Elastic Beanstalk and Google App Engine. It is faster market fordevelopers, easy deployment of web application. It iscost effective and scalable. The issues faced for these services are developers limited, migration issue and vendor lock-in. Saas- Saas stands for Software as a service. In Saas cloud providers provide the software as a service to the end users. It is based on demand services, the service are provided to Cloud computing works by enabling the services through a remotephysical servers, database and computers to access data and cloud applicationoverinternet.Aninternetnetwork connection provide the front end, which includes the accessingclient device, browser,networkandcloudsoftware applications, with the back end, which consists of databases, servers and computers. The back end functions provide repository, storing data that is accessed by the front end.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 198 customer on demand for the software. The user do not need to install the software on personal system. The user does not have to worry about the OS the user is using because it is universally accessible from any platform. Vendors Provide the modest and latest tools and allow multi-tenancy. The issue faced by user for this services can be portability, internet issue the size of software depends on its purpose so some heavy software need strong internet. Deployment Model- There are 3 type of deployment model 1. Public cloud- In public model the providers provide the services like application, storage in general over the internet. It is easy and inexpensive to setup. No wasted resources as users have to pay as pertheuse only. But as this is public cloud security and privacy is a big concern if not managed properly. 2. Private cloud- In private cloud the resources are accessible for only limited number of public behind the firewall, so it minimizes the security concern. It is mainly used by organizations and it gives direct control over data. 3. Hybrid cloud- In Hybrid cloud it is amixofprivateas well as public. And It helps toget bestofbothprivate and public cloud. 3. SECURITY CONCERN IN CLOUD Virtualization is a technique in which a fully functional image of an operating system can be captured and run on the users physical machine. Hypervisor is required to run a virtual operating system in a virtual machine.And if the Hypervisor is vulnerable then the whole system can be compromised and hence the users data can be breached. Another risk involved with virtualization is with allocation and de-allocation of resources. If the memory is allocated to a user and after the use of that client and the same memory is allocated to another user without cleaning the memory then there is a possibility of the data exposure so the allocation and de-allocation is a big part of virtualization. So the proper planning of virtualization should be done. Resources should be properly verified and authenticated should be done before de-allocatedto the users Storage in public cloud is another concern of security in cloud. In public cloud storage facilities are centralized and this attract hackers much often. This is a combination of hardware and software which make little complex design. A single loop hole canlead to compromise the publiccloud.Suggestion for this issue is to use Private cloud if the data is highly sensitive. Multienancy is also considered as one the security concern by experts. The main advantage of cloud is that users can access or rent the resources when they need and only pay for that after that if any another user need the resource, then the infrastructure is used by another user. And this also led to a major security concern. The same storage, CPU, memory are shared to different users which make not only one but multiple users vulnerable. To avoid such issue a highly strong authentication should be done before sharing the resources to another users. 4. DATA SECURITY There are two states where data is vulnerable in cloud. They are data at rest and data in transit. Data security is a big and major concern. Confidentiality and Integrity of data is based on mechanism such as encryption and decryption etc. Data at rest Data at rest means data present in cloud. Data present in cloud can be accessed through internet. This data can be backup or live data. If the functionality have any loop hole this data can be breached easily. Theorganizationcannotcontrolthe data physically so this is a big concern. This can be counter by using privatecloud with morecontrolled access. Data in Transit Data in transit means data travelling in and out of cloud. And it is more vulnerable than data at rest. Data in transit can be files, username, password etc. As the data is traveling from one place to other an intervention can cause majorsecurityconcern.Data in transit can be securedthroughdataencryption.So that if the data is eavesdropped still the data cannot be read by the intruder.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 199 5. SECURITY CHALLENGES Securing cloud will be a big challenge for the organization. Hence it is very important to mimic the securityvulnerability and create a good strong security model to establish in safe cloud environment. Major challenges involve: Lack of proper governance- Cloud providing organization havethecompletecontrolonresources but they have to provide the control to users once the resources is shared this can cause a big security gap. Google, Amazon and other cloud providers states thattheydon’ttakeanyresponsibility,liability or authority forcorruption,unauthorizedetc.Sothis is a big major concern for the users. Malicious attack- Sometimes the architecture of cloud computing environments poses risks to the privacy and security of the customers [2] Insecureor incomplete data deletion- Ifclientwants to deletethe data will it delete the dataaccuratelyor it will just delete incompletely and which it will make a big data security concern due to multi- latency. Data interception- This treat poses more as more third part software and malicious codes are available for sniffing, spoofing etc. 6. CONCLUSION Cloud computing are growing in faster rate. All type of industries are accepting the cloud computing technology. Data present in the cloud can be at high risk if the data is not protected properly. This paper discuss about data security, security concern and virtualization. This paper also discussed about the two states data at rest and data in transit. REFERENCES [1] https://www.techtarget.com/searchcloudcomputing/de finition/cloudcomputing#:~:text=Cloud%20computing %20is%20a%20general,as%20a%20service%20(SaaS). [2] Wang, Y., Chandrasekhar, S., Singhal, M., & Ma, J. (2016). A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing,19(2), 647-662. doi:10.1007/s10586-016- 0560-2
Télécharger maintenant