z-logo
open-access-imgOpen Access
A fully security included Cloud Computing Architecture
Author(s) -
Moitree Basu,
J. K. R. Sastry
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.7.10984
Subject(s) - cloud computing , cloud computing security , computer security , computer science , architecture , enterprise information security architecture , utility computing , sherwood applied business security architecture , installation , security service , security information and event management , information security , operating system , art , visual arts
Many developers have designed their own architecture for installing the cloud computing infrastructure. The existing cloud computing architectures differs in many ways. Security has been the serious issue as client related data and processing is undertaken using the infrastructure provided by third party service providers varies greatly. It is necessary to know the extent of inclusion of security into the cloud computing system and then find the best architecture that includes best and tight security system. In this paper, a comparison of existing architectures from the perspective of inclusion of security infrastructure within cloud computing system is presented along with a comprehensive architecture that is included with every aspect of security taking into account the most of the vulnerabilities.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here