Loading…
Survey on Enhanced Security Control measures in Cloud Computing systems
Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database managem...
Saved in:
Published in: | Journal of physics. Conference series 2021-05, Vol.1878 (1), p.12004 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database management, applications and software, and high power computing performance, all these can be easily attained by subscribing to the cloud service, such that even from a low end PC system, any high end software can be run easily through means of internet. But, providing security to all of these services and stored data of private organizations has always been a challenge. Once a cloud server has been hacked, or an intruder has authorized himself into the server, he can simply sabotage, steal or misuse any sort of information of the client companies stored in within the server’s database. There are many ways to provide security to the different parts of the cloud, some methods are impenetrable, while some are fragile and can be broken through. This paper focusses on the various aspects of the cloud and its security functionalities, and how these security functionalities can be improvised. Some security measures can only protect the cloud by updating and regulating their terms and conditions, and some measures include various authorization methods and regularized access to cloud services. |
---|---|
ISSN: | 1742-6588 1742-6596 |
DOI: | 10.1088/1742-6596/1878/1/012004 |