An intensive stream of messages about the problem of cloud computing security and a significant number of proposals to mitigate and prevent violation of data privacy and the integrity of the cloud computing environment indicate the relevance and significance of the problem. To bring everything into a certain system is the task of this chapter. We use different methodological approaches in order to find such an integrated solution to the combination of these approaches that, on a unified methodological basis, would allow us to look at the whole range of widening issues of ensuring security and the organization of thinking and activity in the near future. This approach allows us to identify additional problems in this area and outline a program for their development. We try to build a system of methodological design and research over the many private methodologies that authors of articles usually use, relying on the experience of generalizing and concretizing system approaches, and, in particular, expanding geographical and historical boundaries, including system generalizations of intercultural studies and philosophical movements. An attempt is made to disassemble the security problem of cloud computing into a certain number of layers, processes, and technologies of thinking, and to reconnect them into a single whole with the character of thinking and activity.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.