Affiliation:
1. Birla Global University, India
Abstract
Cloud computing is a developing zone of computing innovation that shapes the handling power and the computing assets of many associated, topographically separated PCs associated by means of internet. Cloud computing wipes out the need of having a total framework of equipment and programming to meet clients' prerequisites and applications. It very well may be thought of as a total or an incomplete outsourcing of equipment and programming assets. To get to cloud applications, a great internet association and a standard internet program are required. Cloud computing has its own particular downside from the security perspective; this chapter addresses the vast majority of these dangers and their conceivable arrangements. Cloud computing gives its client numerous abilities like getting to an expansive number of utilizations without the requirement for having a permit, acquiring, introducing, or downloading any of these applications.
Reference70 articles.
1. Akatyev, N., & James, J. I. (2017). Evidence identification in IoT networks based on threat assessment. Future Generation Computer Systems.
2. A smart home energy management system using IoT and big data analytics approach
3. Alaba, F. A., Othman, M., Ibrahim, A. T. H., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28.
4. Integration of Cloud computing and Internet of Things: A survey
5. Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献