A study of Advantages and Disadvantages of Cloud Computing
Keywords:
Cloud, Computing, Modern, Technology, IaaSAbstract
The cloud or virtual space in the name of this type of computing refers to the location from which data is accessible. Companies offering cloud services make it possible for customers to backup “their data and programmes to remote servers and then access it through the Internet. So, the user may access it from wherever they happen to be, eliminating the need to physically be in close proximity to the system. When you use cloud computing, your mobile or desktop device doesn't have to do any of the grunt work of data processing. This process also offloads the laborious task to hordes of remote computers. With the Internet serving as the cloud, all of your information and programmes can be accessed from any Internet-connected device, no matter where you are.
References
Sen, Jaydip. 2013. Security and Privacy Issues in Cloud Computing. Architectures and Protocols for Secure Information Technology Infrastructures (iv):1–45. doi: 10.4018/978-1-4666-4514-1.ch001.
Swapna, Asma Islam, Ziaur Rahman, Md Habibur Rahman, and Md Akramuzzaman. 2016. “Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud Based on Packet Utilization.” 2016 1st IEEE International Conference on Computer Communication and the Internet, ICCCI 2016 253–56. doi: 10.1109/CCI.2016.7778919.
Ullrich, Johanna, Jordan Cropper, Peter Frühwirt, and Edgar Weippl. 2016. “The Role and Security of Firewalls in Cyber-Physical Cloud Computing.” Eurasip Journal on Information Security 2016(1). doi: 10.1186/s13635-016-0042-3.
Yan, Xiaowei, Xiaosong Zhang, Ting Chen, Hongtian Zhao, and Xiaoshan Li. 2011. “The Research and Design of Cloud Computing Security Framework.” Lecture Notes in Electrical Engineering 121 LNEE(January 2014):757–63. doi: 10.1007/978-3-642-25541-0_95.
Yeasmin, Mahbuba, Nahida Akter, Mohammed Humayun Kabir, and Javed Hossain. 2018. “Performance Evaluation of Multi-Cloud Compared to the Single-Cloud under Varying Firewall Conditions.” Cogent Engineering 5(1):1–13. doi: 10.1080/23311916.2018.1471974.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.