z-logo
open-access-imgOpen Access
Survey on Enhanced Security Control measures in Cloud Computing systems
Author(s) -
Haider Hadi Abbas,
Zahraa A. Jaaz,
Israa Al_Barazanchi,
Haider Rasheed Abdulshaheed
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1878/1/012004
Subject(s) - cloud computing , cloud computing security , computer security , computer science , the internet , variety (cybernetics) , service (business) , cloud testing , world wide web , operating system , business , artificial intelligence , marketing
Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database management, applications and software, and high power computing performance, all these can be easily attained by subscribing to the cloud service, such that even from a low end PC system, any high end software can be run easily through means of internet. But, providing security to all of these services and stored data of private organizations has always been a challenge. Once a cloud server has been hacked, or an intruder has authorized himself into the server, he can simply sabotage, steal or misuse any sort of information of the client companies stored in within the server’s database. There are many ways to provide security to the different parts of the cloud, some methods are impenetrable, while some are fragile and can be broken through. This paper focusses on the various aspects of the cloud and its security functionalities, and how these security functionalities can be improvised. Some security measures can only protect the cloud by updating and regulating their terms and conditions, and some measures include various authorization methods and regularized access to cloud services.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here