全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cloud Computing: Purpose and Future

DOI: 10.4236/jsea.2024.1710041, PP. 763-769

Keywords: Cloud Computing, Hybrid Cloud, Private Cloud, Public Cloud, IaaS, PaaS, SaaS, On-Premises, Platform, Data Security Systems

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing of storage and computing resources. A hybrid cloud environment is an excellent example of cloud computing. Specifically, the hybrid system provides organizations with increased scalability and control over their data and support for a remote workforce. However, hybrid cloud systems are expensive as organizations operate different infrastructures while introducing complexity to the organization’s activities. Data security is critical among the most vital concerns that have resulted from the use of cloud computing, thus, affecting the rate of user adoption and acceptance. This article, borrowing from the hybrid cloud computing system, recommends combining traditional and modern data security systems. Traditional data security systems have proven effective in their respective roles, with the main challenge arising from their recognition of context and connectivity. Therefore, integrating traditional and modern designs is recommended to enhance effectiveness, context, connectivity, and efficiency.

References

[1]  Mell, P. and Grance, T. (2009) The National Institute of Standards and Technology Definition of Cloud Computing. National Institute of Standards & Technology.
[2]  Rountree, D. and Castrillo, I. (2014) The Basics of Cloud Computing, Syngress.
https://doi.org/10.1016/C2012-0-02521-5
[3]  Laszewski, T. and Nauduri, P. (2012) Migrating to the Cloud. Syngress.
https://doi.org/10.1016/C2010-0-67145-8
[4]  Pallis, G. (2010) Cloud Computing: The New Frontier of Internet Computing. IEEE Internet Computing, 14, 70-73.
https://doi.org/10.1109/mic.2010.113
[5]  Wei, Y. and Blake, M.B. (2010) Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. IEEE Internet Computing, 14, 72-75.
https://doi.org/10.1109/mic.2010.147
[6]  Rajan, S. and Jairath, A. (2011) Cloud Computing: The Fifth Generation of Computing. 2011 International Conference on Communication Systems and Network Technologies, Katra, 3-5 June 2011, 665-667.
https://doi.org/10.1109/csnt.2011.143
[7]  Latif, R., Abbas, H., Assar, S. and Ali, Q. (2014) Cloud Computing Risk Assessment: A Systematic Literature Review. In: Park, J., Stojmenovic, I., Choi, M. and Xhafa, F., Eds., Future Information Technology, Springer, 285-295.
https://doi.org/10.1007/978-3-642-40861-8_42
[8]  Sagiroglu, S. and Sinanc, D. (2013) Big Data: A Review. 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, 20-24 May 2013, 42-47.
https://doi.org/10.1109/cts.2013.6567202
[9]  Chen, D. and Zhao, H. (2012) Data Security and Privacy Protection Issues in Cloud Computing. 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, 23-25 March 2012, 647-651.
https://doi.org/10.1109/iccsee.2012.193
[10]  Takabi, H., Joshi, J.B.D. and Ahn, G. (2010) Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy Magazine, 8, 24-31.
https://doi.org/10.1109/msp.2010.186

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133