Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
Distributed computing is a widely utilized approach for rapidly enhancing an organization’s information technology capabilities while minimizing additional resource requirements. It can efficiently and effectively broaden an organization’s existing IT competencies. In recent years, distributed compu...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Academic Research Online Publisher
2015
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/7311/ http://umpir.ump.edu.my/id/eprint/7311/ http://umpir.ump.edu.my/id/eprint/7311/1/ICCSCE_2015.pdf http://umpir.ump.edu.my/id/eprint/7311/4/fskkp-2015-mazlina-Security%20Everywhere%20Cloud.pdf |
Summary: | Distributed computing is a widely utilized approach for rapidly enhancing an organization’s information technology capabilities while minimizing additional resource requirements. It can efficiently and effectively broaden an organization’s existing IT competencies. In recent years, distributed computing has developed from being a novel and unfamiliar business idea into a rapidly expanding IT business sector. However, as additional organizations and individuals relocate their data and applications into the cloud, significant concerns are starting to develop regarding the infrastructure’s ability to protect sensitive data. Despite the considerable movement toward cloud-based computing, venture clients remain hesitant to relocate their business data into the cloud. Security has proved to be a significant issue, and those concerns continue to diminish the development of distributed computing |
---|