REVIEW ON SPACE AND SECURITY ISSUES IN CLOUD COMPUTING

被引:0
作者
Rao, N. Thirupathi [1 ]
Bhattacharyya, Debnath [1 ]
机构
[1] Vignans Inst Informat Technol A, Dept Comp Sci & Engn, Visakhapatnam 530049, Andhra Pradesh, India
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2019年 / 13卷 / 02期
关键词
Security techniques; space issues for security; architecture; cloud computing; firewalls;
D O I
10.33832/ijsia.2019.13.2.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is the most advanced and mostly used technology for the never-ending IT and software technologies. Various number of large servers was used in cloud models for storing the vast amount of data. To store massive databases, various setoff servers with high-end hardware and with fast internet facilities were required and with set of servers for providing services to the end users. In these servers, users store massive amount of data and also retrieve from time to time, providing security to the data in these cloud computing models was very much essential and important. Hence, as the data storing in the various locations of the servers, the provision of adjusting the various amount of considerable data in the servers at various locations from time to time was essential and also the provision of security to these massive set of databases and also retrieving and storing the data is more critical. Hence, we need to provide more security to the data being stored in the huge number of the server. As we need to provide security to these servers, several factors are important to note. The detail description about these points was presented in the current article in detail.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 11 条
[1]  
[Anonymous], 2001, 197 FIPS NIST US DEP
[2]  
[Anonymous], 2005, SCHNEIER SECURITY BL
[3]  
[Anonymous], 2004, S NIST SPECIAL PUBLI
[4]  
Bellare Mihir., 2005, INTRO MODERN CRYPTOG, P10, DOI 10.4324/9780203977453-7
[5]  
Daemen J, 2001, RIJNDAEL AES ADV ENC
[6]  
Davis R. M., 1978, IEEE Communications Society Magazine, V16, P5, DOI 10.1109/MCOM.1978.1089771
[7]  
Kumari S. K., 2014, INT J RES SOCIOLOGY, V2, P1
[8]  
Menezes A.J., HDB APPL CRYPTOGRAPH
[9]  
Schneier B, 1993, INT WORKSH FAST SOFT, P191, DOI DOI 10.1007/3-540-58108-1_24
[10]  
Simmonds A, 2004, LECT NOTES COMPUT SC, V3285, P317