Please use this identifier to cite or link to this item: https://hdl.handle.net/10321/4195
DC FieldValueLanguage
dc.contributor.authorLourens, Melanie Elizabethen_US
dc.contributor.authorKaushik, Manishen_US
dc.contributor.authorGoyal, Jayantien_US
dc.contributor.authorSingh, Rajeshen_US
dc.contributor.authorKuchhal, Shikhaen_US
dc.contributor.authorTiwari, Mohiten_US
dc.date.accessioned2022-08-26T12:38:29Z-
dc.date.available2022-08-26T12:38:29Z-
dc.date.issued2022-04-28-
dc.identifier.citationLourens, M.E. et al. 2022. The role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectively. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Presented at: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). : 2303-2306. doi:10.1109/icacite53722.2022.9823892en_US
dc.identifier.isbn9781665437899-
dc.identifier.urihttps://hdl.handle.net/10321/4195-
dc.description.abstractThe term cloud computing possesses the critical aspect to enhance the network by leveraging the available resources in an effective manner. It has been widely stated that the usage of enhanced IT infrastructure support in realising the goals of the stakeholders in an easier aspect. Cloud computing is a shared pool of operations that is growing in popularity due to its low cost, high efficiency, and high output. Along with its many advantages, cloud computing presents a considerably more difficult scenario in terms of data privacy, intellectual property rights, authenticated access, data security, and so on. Cloud computing technology is becoming ever more challenging in today's society as a result of these challenges. This paper aims to evaluate the security issues in cloud services and implementation of advanced technology to prevent these challenges. In this context, mixed method has been considered (primary quantitative and secondary qualitative) to gather relevant and factual information.en_US
dc.format.extent4 p.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectCloud computingen_US
dc.subjectTechnologyen_US
dc.subjectSecurityen_US
dc.subjectCloud technologyen_US
dc.subjectChallengesen_US
dc.subjectCloud securityen_US
dc.subjectSecurity breachen_US
dc.titleThe role of implementing cloud computing technology for addressing critical security issues and overcoming the challenges effectivelyen_US
dc.typeConferenceen_US
dc.date.updated2022-08-24T09:55:19Z-
dc.relation.conference2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)en_US
dc.identifier.doi10.1109/icacite53722.2022.9823892-
item.fulltextWith Fulltext-
item.openairetypeConference-
item.languageiso639-1en-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:Research Publications (Management Sciences)
Files in This Item:
File Description SizeFormat
LourensMRole_2022.pdfArticle235.05 kBAdobe PDFView/Open
Show simple item record

Page view(s)

208
checked on Dec 22, 2024

Download(s)

105
checked on Dec 22, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.