|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
|
09 May 2023, Volume 38 Issue 3
|
|
|
Abstract
The use of cloud computing to store and access data, applications and other vital resources can help organisations effectively. However, challenges can also be seen in the use of cloud computing. The overall service of CC has been distributed in three parties that are infrastructure as a service or IaaS, platform as a service or PaaS and software as a service or SaaS. Handling all this efficiently is needed unless misconfiguration of the cloud resources can lead to security threats. Primary quantitative methods have been chosen for this study where 60 participants have been chosen randomly. Concern has been taken from the participants before provisioning survey questions. Graphical analysis has been done in this study to gather information regarding all opportunities of cloud computing and the challenges present in it. The use of CC in companies can help in managing IT-expenses and bring opportunities. However, challenges can occur in the operation of the business. Misconfiguration, hacking and other challenges can damage the smooth work of individuals and companies effectively. A brief explanation throughout the study helped in reaching the aim of the study and the survey has helped in gathering all relevant information.
Keyword
Cloud computing, centralised data, data security, hacking, misconfiguration
PDF Download (click here)
|
|
|
|
|