Publication: Survey on Enhanced Security Control measures in Cloud Computing systems
| dc.citedby | 4 | |
| dc.contributor.author | Abbas H.H. | en_US |
| dc.contributor.author | Jaaz Z.A. | en_US |
| dc.contributor.author | Albarazanchi I. | en_US |
| dc.contributor.author | Abdulshaheed H.R. | en_US |
| dc.contributor.authorid | 57211923537 | en_US |
| dc.contributor.authorid | 57210340202 | en_US |
| dc.contributor.authorid | 57659035200 | en_US |
| dc.contributor.authorid | 57209849809 | en_US |
| dc.date.accessioned | 2023-05-29T09:07:12Z | |
| dc.date.available | 2023-05-29T09:07:12Z | |
| dc.date.issued | 2021 | |
| dc.description | Application programs; Digital storage; Personal computers; Computing performance; Database management; Digital environment; Internet based; Private organizations; Remote storage; Security controls; Security measure; Storage as a service (STaaS) | en_US |
| dc.description.abstract | Cloud Computing System is an internet based network of systems that provides a wide range of services to various companies and individuals, creating a digital environment for business progressing for a better world. Cloud Computing delivers a variety of services like remote storage, database management, applications and software, and high power computing performance, all these can be easily attained by subscribing to the cloud service, such that even from a low end PC system, any high end software can be run easily through means of internet. But, providing security to all of these services and stored data of private organizations has always been a challenge. Once a cloud server has been hacked, or an intruder has authorized himself into the server, he can simply sabotage, steal or misuse any sort of information of the client companies stored in within the server's database. There are many ways to provide security to the different parts of the cloud, some methods are impenetrable, while some are fragile and can be broken through. This paper focusses on the various aspects of the cloud and its security functionalities, and how these security functionalities can be improvised. Some security measures can only protect the cloud by updating and regulating their terms and conditions, and some measures include various authorization methods and regularized access to cloud services. � Published under licence by IOP Publishing Ltd. | en_US |
| dc.description.nature | Final | en_US |
| dc.identifier.ArtNo | 12004 | |
| dc.identifier.doi | 10.1088/1742-6596/1878/1/012004 | |
| dc.identifier.issue | 1 | |
| dc.identifier.scopus | 2-s2.0-85108641121 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108641121&doi=10.1088%2f1742-6596%2f1878%2f1%2f012004&partnerID=40&md5=ee6e4666212527dc0102709394638c4d | |
| dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/26149 | |
| dc.identifier.volume | 1878 | |
| dc.publisher | IOP Publishing Ltd | en_US |
| dc.relation.ispartof | All Open Access, Bronze | |
| dc.source | Scopus | |
| dc.sourcetitle | Journal of Physics: Conference Series | |
| dc.title | Survey on Enhanced Security Control measures in Cloud Computing systems | en_US |
| dc.type | Conference Paper | en_US |
| dspace.entity.type | Publication |