Abstract |
: |
Cloud architectures constitute cost-efficient moral fibers that will support the transmission, storage, and computing of the applications contents. These infrastructures can be used for scientific and pervasive computing purposes, business. The services delivered through cloud infrastructures increases their exposure to security incidents and attacks. The expenditure and intricacy reduction requirements render the design and development of protection mechanisms.
Solution features such as authentication, anonymity, survivability, confidentiality, privacy, dependability, and fault tolerance, conflicting. The objective of this is to that modern of security and explores research in protection of cloud communications and networking infrastructures.
A stress will be made on the association of hand held devices in cloud based infrastructures. The essential concepts of cloud computing security will be explored, counting cloud computing security services, cloud computing security principles, cloud security requirements, and testing techniques.
|