TY - GEN
T1 - Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety
AU - Manjunath, C. R.
AU - Sharma, Sachin
AU - Sharma, Aditi
AU - Sunil Kumar, M.
AU - Kelkar, Sandeep
AU - Vishal Deshmukh, Sheetal
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on the security issues related to the cloud. This thorough literature study's objective is to assess the state of knowledge on dangers, difficulties, and privacy for public cloud. This studies from different countries at the areas of study that some well rising institutions are focusing between on 2010. and 2020. We chose 81 papers after carefully examining several attempts to solve the stated research issues. The study's results revealed seven serious security threats to internet data centres. The results revealed that a few of the extensively covered subjects with in chosen works included data modification and leaking. Network discontinuities, storing, and information inside the realm of public cloud were also recognised potential threats. The findings of this Study also shown that CSPs and internet users alike still have difficulties when reassessing client data. The cryptocurrency was identified in our research report as an innovation activitythat would help to allay security worries. The SLR findings reveal a few things that should be done in efforts to provide categorization, legitimacy, and information availability in the present.
AB - In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on the security issues related to the cloud. This thorough literature study's objective is to assess the state of knowledge on dangers, difficulties, and privacy for public cloud. This studies from different countries at the areas of study that some well rising institutions are focusing between on 2010. and 2020. We chose 81 papers after carefully examining several attempts to solve the stated research issues. The study's results revealed seven serious security threats to internet data centres. The results revealed that a few of the extensively covered subjects with in chosen works included data modification and leaking. Network discontinuities, storing, and information inside the realm of public cloud were also recognised potential threats. The findings of this Study also shown that CSPs and internet users alike still have difficulties when reassessing client data. The cryptocurrency was identified in our research report as an innovation activitythat would help to allay security worries. The SLR findings reveal a few things that should be done in efforts to provide categorization, legitimacy, and information availability in the present.
UR - http://www.scopus.com/inward/record.url?scp=85177434927&partnerID=8YFLogxK
U2 - 10.1109/ICACITE57410.2023.10182893
DO - 10.1109/ICACITE57410.2023.10182893
M3 - Conference contribution
AN - SCOPUS:85177434927
T3 - 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
SP - 1064
EP - 1068
BT - 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
Y2 - 12 May 2023 through 13 May 2023
ER -