Personal Data Security and Protection Solution Proposals in Cloud Computing

المؤلفون

  • Tarek Mosbah Abdala Department of Professions Computer Higher Institute For Comprehensive Profession Kabaw Author

الكلمات المفتاحية:

الحوسبة السحابية، نماذج خدمات الحوسبة السحابية، الأمن، التهديدات، وسائل الدفاع المحتملة.

الملخص

Cloud computing is one of the most popular terms in the computer industry right now. Virtualization enables resource sharing, which includes software, platform, and infrastructure. The underlying technology underpinning cloud resource sharing is virtualization. This environment aspires to be dynamic, dependable, and configurable, with a high level of service assurance. Security is just as important in the cloud as it is everywhere else. Various people have different perspectives on cloud computing. Some people feel that using the cloud is risky. Cloud providers go to great lengths to assure security. This study looks at a few important security vulnerabilities with cloud computing, as well as available remedies to those security issues in the cloud computing sector.

التنزيلات

تنزيل البيانات ليس متاحًا بعد.

المراجع

1. Abdul-Jabbar, S.S., Aldujaili, A., Mohammed, S.G. and Saeed, H.S., 2020. Integrity and Security in Cloud Computing Environment: A Review. Journal of Southwest Jiaotong University, 55(1).

2. Alam, T., 2020. Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), pp.108-115.

3. 28. Zhang, D., Jiang, T. and Wu, S., 2020. Brief Talk on Cloud Computing Technology. International Journal of Social Science and Education Research, 3(6), pp.168-171.

1. Tadapaneni, N. R. (2020). Cloud Computing - An Emerging Technology. International Journal of Innovative Science and Research Technology. 5.

2. Jamil, D., Zaki, H. (2011) Cloud Computing Security. International Journal of Engineering Science and Technology 3(4), 3478–3483.

3. Tadapaneni, N. R. (2017). Different Types of Cloud Service Models. Available at SSRN 3614630.

4. Bikram, B. (2009) Safe on the Cloud. A Perspective into the Security Concerns of Cloud Computing 4, 34–35.

5. Dikaiakos, M.D., Katsaros, D., Mehra, P. (2009) Cloud Computing: Distributed Internet Computing for IT and Scientific Research 13, 10–13.

6. Tadapaneni, N. R. (2018). Cloud Computing: Opportunities and Challenges. SSRN Electronic Journal. 10.2139/ssrn.3563342.

7. Srinivas, Reddy, Qyser, J. (2014), Cloud Computing Basics, Build. Infrastructure. Cloud Security., vol. 1, pp. 3–22,

8. Ion, I., Sachdeva, Kumaraguru, P., & Čapkun, S. (2011). Home is safer than the cloud: privacy concerns for consumer cloud storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security (p. 13).

9. 10) Puthal, Sahoo, Mishra, Swain, P.(2015) cloud computing features,Issues and Challenges:A big picture”, International Conference on Computational Intelligence & Networks, pp. 116-123.

10. Tadapaneni, N. R. (2020). Artificial Intelligence Security and Its Countermeasures. International Journal of Advanced Research in Computer Science & Technology, Vol. 8.

11. Tadapaneni, N. R. (2020). A Survey Of Various Load Balancing Algorithms In Cloud Computing. International Journal for Science and Advance Research in Technology, 6.

12. Selviandro, Suryani, A. Hasibuan, S.(2015), Open learning optimization based on cloud technology: case study implementation in personalization E-learning, February 16~19, pp. 541-546.

13. Winkler, V.(2011) Securing the Cloud, Cloud Comput. Secur. Tech. tactics. Elsevier.

14. Sabahi, F.(2011). Virtualization-level security in cloud computing, 2011 IEEE 3rd Int. Conf. Communication. Software. Networks, pp. 250–254

التنزيلات

منشور

2026-03-17

كيفية الاقتباس

Personal Data Security and Protection Solution Proposals in Cloud Computing. (2026). مجلة الفاروق للعلوم, 2(1), 538-545. https://www.afjs.histr.edu.ly/index.php/afjs/article/view/68