Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/4195
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lourens, Melanie Elizabeth | en_US |
dc.contributor.author | Kaushik, Manish | en_US |
dc.contributor.author | Goyal, Jayanti | en_US |
dc.contributor.author | Singh, Rajesh | en_US |
dc.contributor.author | Kuchhal, Shikha | en_US |
dc.contributor.author | Tiwari, Mohit | en_US |
dc.date.accessioned | 2022-08-26T12:38:29Z | - |
dc.date.available | 2022-08-26T12:38:29Z | - |
dc.date.issued | 2022-04-28 | - |
dc.identifier.citation | Lourens, M.E. et al. 2022. The role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectively. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Presented at: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). : 2303-2306. doi:10.1109/icacite53722.2022.9823892 | en_US |
dc.identifier.isbn | 9781665437899 | - |
dc.identifier.uri | https://hdl.handle.net/10321/4195 | - |
dc.description.abstract | The term cloud computing possesses the critical aspect to enhance the network by leveraging the available resources in an effective manner. It has been widely stated that the usage of enhanced IT infrastructure support in realising the goals of the stakeholders in an easier aspect. Cloud computing is a shared pool of operations that is growing in popularity due to its low cost, high efficiency, and high output. Along with its many advantages, cloud computing presents a considerably more difficult scenario in terms of data privacy, intellectual property rights, authenticated access, data security, and so on. Cloud computing technology is becoming ever more challenging in today's society as a result of these challenges. This paper aims to evaluate the security issues in cloud services and implementation of advanced technology to prevent these challenges. In this context, mixed method has been considered (primary quantitative and secondary qualitative) to gather relevant and factual information. | en_US |
dc.format.extent | 4 p. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Technology | en_US |
dc.subject | Security | en_US |
dc.subject | Cloud technology | en_US |
dc.subject | Challenges | en_US |
dc.subject | Cloud security | en_US |
dc.subject | Security breach | en_US |
dc.title | The role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectively | en_US |
dc.type | Conference | en_US |
dc.date.updated | 2022-08-24T09:55:19Z | - |
dc.relation.conference | 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | en_US |
dc.identifier.doi | 10.1109/icacite53722.2022.9823892 | - |
item.fulltext | With Fulltext | - |
item.openairetype | Conference | - |
item.languageiso639-1 | en | - |
item.grantfulltext | open | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Research Publications (Management Sciences) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
LourensMRole_2022.pdf | Article | 235.05 kB | Adobe PDF | View/Open |
Page view(s)
208
checked on Dec 22, 2024
Download(s)
105
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.