Loading…

Survey on Enhanced Security Control measures in Cloud Computing systems

Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database managem...

Full description

Saved in:
Bibliographic Details
Published in:Journal of physics. Conference series 2021-05, Vol.1878 (1), p.12004
Main Authors: Abbas, Haider Hadi, Jaaz, Zahraa A., Al_Barazanchi, Israa, Abdulshaheed, Haider Rasheed
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database management, applications and software, and high power computing performance, all these can be easily attained by subscribing to the cloud service, such that even from a low end PC system, any high end software can be run easily through means of internet. But, providing security to all of these services and stored data of private organizations has always been a challenge. Once a cloud server has been hacked, or an intruder has authorized himself into the server, he can simply sabotage, steal or misuse any sort of information of the client companies stored in within the server’s database. There are many ways to provide security to the different parts of the cloud, some methods are impenetrable, while some are fragile and can be broken through. This paper focusses on the various aspects of the cloud and its security functionalities, and how these security functionalities can be improvised. Some security measures can only protect the cloud by updating and regulating their terms and conditions, and some measures include various authorization methods and regularized access to cloud services.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1878/1/012004