2021
DOI: 10.1088/1757-899x/1090/1/012078
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Services and Cloud Perspectives: A Review

Abstract: Cloud computing is a popular paradigm in information technology and computing as it offers numerous advantages in terms of economical saving and minimal management effort to many organizations agencies. Although elasticity and flexibility brings tremendous benefits, it still raises many information security challenges that have created a barrier against adopting this agile Cloud computing. This paper provides a review study on the cloud computing as well identifying 25-key factors to fulfil better practice in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 70 publications
0
1
0
Order By: Relevance
“…They can offer substantial access to several warning systems using their shared pool capabilities, thereby ensuring sustainable availability. Sharing cloud resources is more advantageous than expanding existing web-based platforms [40]. The advantage of cloud computing technology is access to real-time voluminous data processing and its ability to obtain a huge volume of data from different integrated systems.…”
Section: Cloud Computing-based Ews Opportunitiesmentioning
confidence: 99%
“…They can offer substantial access to several warning systems using their shared pool capabilities, thereby ensuring sustainable availability. Sharing cloud resources is more advantageous than expanding existing web-based platforms [40]. The advantage of cloud computing technology is access to real-time voluminous data processing and its ability to obtain a huge volume of data from different integrated systems.…”
Section: Cloud Computing-based Ews Opportunitiesmentioning
confidence: 99%
“…Do đó, một loạt các yếu tố đã được đề cập để cải thiện tốt hơn tính an toàn của giải pháp này trong nghiên cứu của tác giả Ahmed và cs. [15].…”
Section: Giới Thiệuunclassified
“…Till today, three headlines can form the techniques of two-step authentication [3]. Hardware-based encryption and related techniques are using graphical/alphanumeric encryption, biological and behavioral features [4] .The biological and behavioral properties can be divided into two features as physical biology and behavioral biometry. Behavioral biometrics includes compiling information such as walking information and location traces.…”
Section: Introductionmentioning
confidence: 99%