By Topic

Perusal about influences of cloud computing on the processes of these days and presenting new ideas about its security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Kashefi, F. ; Dept. of Electr. Eng., Islamic Azad Univ., Shabestar, Iran ; Majdi, M. ; Darbandi, M. ; Purhosein, H.
more authors

Cloud is a virtual image about an environment that it's widespread and powers are unknown, and because of we haven't any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing [1]. This technology presents lots of capabilities such as processing power, storage and accessing, supporting and etc. by the means of internet. Cloud computing is reliable services that presenting by next generation data centers and from internet, they based on virtual technologies and computes [4]. In recent decades the internet has very deep influences in human lives and in offer and demand conditions; lots of people for trading, reading the news, seeing the movies or to play online games go through the internet. As our daily needs from the internet became more, so that the processing power should increase significantly [8]. With remarkable developments of communication and information technology in recent days, we consider processing and processing power as the fifth vital instrument in human lives (after water, electricity, gas and telephone) [9]. These days lots of technologies migrate from traditional systems into cloud, we should note that cloud can be used for military and non-military purposes [3]. On the other hand, in such a large scale network we should consider the security of files and information, because if we tranquilize the people and organizations about the security of such networks they became more eager to migrate to this new technology. In this paper, at first we consider significant influences of this technology on some of the biggest companies and organizations all over the world, after that we present our new ideas about increasing security of such networks [1] to [6].

Published in:

Application of Information and Communication Technologies (AICT), 2011 5th International Conference on

Date of Conference:

12-14 Oct. 2011