Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Improve the Security of Cloud Computing to Enhance Network Security

Version 1 : Received: 17 July 2023 / Approved: 18 July 2023 / Online: 18 July 2023 (14:20:36 CEST)

How to cite: Tavangari, S.; Taghavi Kulfati, S.; Yelghi, A. Improve the Security of Cloud Computing to Enhance Network Security. Preprints 2023, 2023071222. https://doi.org/10.20944/preprints202307.1222.v1 Tavangari, S.; Taghavi Kulfati, S.; Yelghi, A. Improve the Security of Cloud Computing to Enhance Network Security. Preprints 2023, 2023071222. https://doi.org/10.20944/preprints202307.1222.v1

Abstract

In recent years, significant progress has been observed in cloud computing. As the number of companies using the cloud increases, so does the need to protect user data. Today, the major challenges facing cloud computing include the security, protection, and processing of data belonging to users. This study aims to investigate security issues and identify appropriate security techniques in the world of cloud computing. Also, the identification of security challenges that may arise in the field of cloud computing in the future has been evaluated. In this research, we used two different research methods: systematic literature review (SLR), and survey and interview with different security experts who work in the field of cloud computing. All the security challenges, most compromised attributes, and identified mitigation techniques from both SLR and survey were presented and discussed.

Keywords

cloud computing; security challenges; security techniques

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.