Threats and Problems of Cloud Computing and Ways of Providing Security

α
Dr.Yasser Elmalik Ahmed Seleman
Dr.Yasser Elmalik Ahmed Seleman
σ
Niema AbdElhamid Abd Elwahab
Niema AbdElhamid Abd Elwahab
α University of Bisha

Send Message

To: Author

Threats and Problems of Cloud Computing and Ways of Providing Security

Article Fingerprint

ReserarchID

CSTBB1914

Threats and Problems of Cloud Computing and Ways of Providing Security Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

References

7 Cites in Article
  1. Amazon virtual private cloud.
  2. (2009). Cloud computing risk assessment.
  3. J Hurwitz,R Bloor,M Kaufman,F Halper (2010). Wiley Publishing, Inc. End‐User License Agreement.
  4. Michael Armbrust (2009). Above the Clouds: A Berkeley View of Cloud Computing.
  5. Thomas Ristenpart,Eran Tromer,Hovav Shacham,Stefan Savage (2009). Hey, you, get off of my cloud.
  6. J Rosenberg,A Mateosm (2011). The Cloud at your Servace.
  7. Matt Goldner (2010). abilities monitor much more information than central conceptual abilities can pro-cess; and second, central abilities always have plenty of unfinished business. The key problem for efficient short-term information processing is thus to achieve an optimal allocation of central processing resources. Resources have to be allocated to the processing of information which is likely to bring about the greatest con-tribution to the mind’s general cognitive goals at the smallest processing cost. Some information is old: it is already present in the individual’s representa-tion of the world. Unless it is needed for the performance of a particular cogni-tive task, and is easier to access from the environment than from memory, such information is not worth processing at all. Other information is not only new but entirely unconnected with anything in the individual’s representation of the world. It can only be added to this representation as isolated bits and pieces, and this usually means too much processing cost for too little benefit. Still other informa-tion is new but connected with old information. When these interconnected new and old items of information are used together as premises in an inference pro-cess, further new information can be derived: information which could not have been inferred without this combination of old and new premises. When the pro-cessing of new information gives rise to such a multiplication effect, we call it relevant. The greater the multiplication effect, the greater the relevance. Consider an example. Mary and Peter are sitting on a park bench. He leans back, which alters her view. By leaning back, he modifies her cognitive environ-ment; he reveals to her certain phenomena, which she may look at or not, and describe to herself in different ways. Why should she pay attention to one phe-nomenon rather than another, or describe it to herself in one way rather than another? In other words, why should she mentally process any of the assumptions which have become manifest or more manifest to her as a result of the change in her environment? Our answer is that she should process those assumptions that are most relevant to her at the time. Imagine, for instance, that as a result of Peter’s leaning back she can see, among other things, three people: an ice-cream vendor who she had noticed before when she sat down on the bench, an ordinary stroller who she has never seen before, and her acquaintance William, who is coming towards them and is a dread-ful bore. Many assumptions about each of these characters are more or less man-ifest to her. She may already have considered the implications of the presence of the ice-cream vendor when she first noticed him; if so, it would be a waste of processing resources to pay further attention to him now. The presence of the unknown stroller is new information to her, but little or nothing follows from it; so there again, what she can perceive and infer about him is not likely to be of much relevance to her. By contrast, from the fact that William is coming her way, she can draw many conclusions from which many more conclusions will fol-low. This, then, is the one truly relevant change in her cognitive environment; this is the particular phenomenon she should pay attention to. She should do so, that is, if she is aiming at cognitive efficiency. Our claim is that all human beings automatically aim at the most efficient information processing possible. This is so whether they are conscious of it or not;.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr.Yasser Elmalik Ahmed Seleman. 2017. \u201cThreats and Problems of Cloud Computing and Ways of Providing Security\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 17 (GJCST Volume 17 Issue B1): .

Download Citation

Issue Cover
GJCST Volume 17 Issue B1
Pg. 15- 18
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-B Classification: C.2.4, D.4.6
Version of record

v1.2

Issue date

August 9, 2017

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 6515
Total Downloads: 1598
2026 Trends
Related Research

Published Article

Abstract not found

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Threats and Problems of Cloud Computing and Ways of Providing Security

Dr.Yasser Elmalik Ahmed Seleman
Dr.Yasser Elmalik Ahmed Seleman University of Bisha
Niema AbdElhamid Abd Elwahab
Niema AbdElhamid Abd Elwahab

Research Journals