IJEAST 2022
DOI: 10.33564/ijeast.2022.v06i09.036
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Security Services and Threats in Cloud Computing

Abstract: Digitalization has infiltrated all sides of modern culture today. One of the most important aspects of making this procedure secure is authentication. Cyber criminals are putting in a lot of effort to break into existing network channels and launch destructive assaults. When it comes to businesses, information is a valuable resource. The question here is how to safeguard crucial information. This takes into account a variety of features of a society that is commonly referred to as hyper connected, such as onli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Vendors' lock-in reliance is also an aspect that need examination as the analysts may excessively depend on the basis or the system of the particular provider which is ineffective and a matter which does not allow innovation in technology handling. [14], [15] On the contrary to the specific viewpoint of the Secure confirmation and section control systems, the matter is very serious as it affects the integrity of the information. Examples of common login tasks include the use of weak username-password combinations which can be used to crack passwords, while the lax controls on information can also lead to unauthorized access and alterations.…”
Section: Iiliterature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Vendors' lock-in reliance is also an aspect that need examination as the analysts may excessively depend on the basis or the system of the particular provider which is ineffective and a matter which does not allow innovation in technology handling. [14], [15] On the contrary to the specific viewpoint of the Secure confirmation and section control systems, the matter is very serious as it affects the integrity of the information. Examples of common login tasks include the use of weak username-password combinations which can be used to crack passwords, while the lax controls on information can also lead to unauthorized access and alterations.…”
Section: Iiliterature Reviewmentioning
confidence: 99%
“…This happens when a company announces their own proprietary solution for technology which hampers the user from switching to another supplier. [14], [15]…”
Section: Vendor Lock-inmentioning
confidence: 99%
“…Users who experience difficulty transferring data between cloud providers raise concerns regarding vendor lock-in and highlight the challenge of data portability. Selecting cloud services that actively promote data portability and conform to open standards is advised in order to solve this problem [71], [72]. Users can help to ensure more seamless data migration procedures by giving priority to these features.…”
Section: Data Portability and Vendor Lock-inmentioning
confidence: 99%