International Journal of Cryptocurrency Research
|
Volume 1, Issue 1, December 2021 | |
Research PaperOpenAccess | |
Cloud Computing Mechanism for Security |
|
Mohammed I. Alghamdi1* |
|
1Department of Computer Science, Al-Baha University, Al-Baha City, Kingdom of Saudi Arabia. E-mail: mialmushilah@bu.edu.sa
*Corresponding Author | |
Int.J.Cryp.Curr.Res. 1(1) (2021) 81-89, DOI: https://doi.org/10.51483/IJCCR.1.1.2021.81-89 | |
Received: 12/09/2021|Accepted: 22/11/2021|Published: 05/12/2021 |
Recently, cloud computing—which describes the use of a collection of distributed services, applications, information, and infrastructure comprised of pools of computers, networks, information, and storage resources—has grown from being a promising business concept to one of the fast-growing segments of the IT industry. It extends Information Technology's (IT) existing capabilities. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. However, security has always been seen as the biggest barrier to putting applications in the cloud. Encryption, authentication, and other security issues are real threats when it comes to adopting cloud computing. When we are talking about data security, issues like data breach liability and data privacy are bound to arise. This paper extends the work that has earlier been established (Stephanie et al., 1997; Somayaji and Forrest, 1998; Forrest et al., 2002; Top Threats to Cloud Computing, 2010). Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, applying the protocol in cloud environment might have effective impact.
Keywords: Security, Cloud computing, networks, IT industry
Full text | Download |
Copyright © SvedbergOpen. All rights reserved