Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Building Trust in Cloud Computing:Strategies for Resilient Security

View through CrossRef
Cloud computing is a technology that will change how data is stored, managed, and accessed. It reduces the need for users to set up hardware and computing resources on demand, and it eases things for businesses and individuals, but as cloud computing becomes more common, security problems are becoming a big issue for its future growth. They focus on the three basic models of cloud computing: Software as a Service-SaaS, Platform as a Service-PaaS, and Infrastructure as a Service-IaaS; add the main architectural models: public, private, hybrid, and multi-cloud, analyse their advantages and disadvantages, as well as potential security risks. The cloud computing security system is a most crucial aspect. It includes how technologies such as identity and access management, firewalls, intrusion detection systems, data encryption, etc., protect data and examines the possibility of using new technologies such as artificial intelligence, blockchain, and zero-trust architectures. It should greatly improve the security of cloud computing, using intelligence in threat detection, decentralised management, and ongoing verification. Some common issues are dealt with, including data leakage, unsafe APIs, and insider threats. The importance of focusing on multi-layer defence is then highlighted. We look at the current state of cloud security technologies and strategies, along with future improvements we need. The goal is for cloud service providers and users to work together in using a layered security approach, a shared responsibility model, and new technologies to create a safe and dependable cloud environment. This security model will be able to cope not only with the complexity of network threats but also with the continuity of cloud computing technological development, thereby carrying important values in references for the research and practice of related technologies.
Title: Building Trust in Cloud Computing:Strategies for Resilient Security
Description:
Cloud computing is a technology that will change how data is stored, managed, and accessed.
It reduces the need for users to set up hardware and computing resources on demand, and it eases things for businesses and individuals, but as cloud computing becomes more common, security problems are becoming a big issue for its future growth.
They focus on the three basic models of cloud computing: Software as a Service-SaaS, Platform as a Service-PaaS, and Infrastructure as a Service-IaaS; add the main architectural models: public, private, hybrid, and multi-cloud, analyse their advantages and disadvantages, as well as potential security risks.
The cloud computing security system is a most crucial aspect.
It includes how technologies such as identity and access management, firewalls, intrusion detection systems, data encryption, etc.
, protect data and examines the possibility of using new technologies such as artificial intelligence, blockchain, and zero-trust architectures.
It should greatly improve the security of cloud computing, using intelligence in threat detection, decentralised management, and ongoing verification.
Some common issues are dealt with, including data leakage, unsafe APIs, and insider threats.
The importance of focusing on multi-layer defence is then highlighted.
We look at the current state of cloud security technologies and strategies, along with future improvements we need.
The goal is for cloud service providers and users to work together in using a layered security approach, a shared responsibility model, and new technologies to create a safe and dependable cloud environment.
This security model will be able to cope not only with the complexity of network threats but also with the continuity of cloud computing technological development, thereby carrying important values in references for the research and practice of related technologies.

Related Results

THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash Abstract This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
PurposeCloud computing services are game-changing in empowering organizations to drive innovation and unlock new growth opportunities. Accordingly, this study aims to examine the d...
Key based Cryptography in Cloud Computing
Key based Cryptography in Cloud Computing
Cloud computing is virtual computing infrastructure for increasing capabilities and developing potentialities dynamically while not adding new infrastructure, personnel, or code sy...

Back to Top