Header menu link for other important links
A Survey on Security Threats in Cloud Computing Service Models
Published in Institute of Electrical and Electronics Engineers Inc.
Pages: 574 - 580
The advent of cloud computing has enabled many users and organizations to make better use of system and business resources. Cloud computing's primary benefits are its cheaper service costs and the absence of the requirement for users to invest in expensive computing hardware. Because of the accessibility of its resources and flexibility for user computing operations, individuals and organizations migrate their programs, data, and resources to cloud storage services. A transition from localized to remote computing has brought with it a plethora of security risks and challenges for both users and service providers. However, there is one significant disadvantage to cloud computing: the storage of your data is in the hands of a third party. Amongst the most daunting concerns in providing powerful storage and processing as on-demand Services is the security threat posed by resource sharing in Cloud computing. Increasing efficiency and better performance are driving governments and organizations around the world to use cloud computing, either from scratch or as part of existing infrastructure. Risk and challenges associated with cloud computing, as well as the measures that can be taken to help shield the cloud from security threats, are discussed in this paper. © 2022 IEEE.
About the journal
JournalProceedings - 2022 6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Open AccessNo