Abstract
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags
Highlights
Cloud computing refers to a virtual platform where users are permitted to handle necessary computational facilities, namely, servers, applications, storage spaces, and networks, remotely
Another threat with a multi-cloud interface is the circumstances of vendor lock-in, which is defined as a state where the client becomes dependent on the network service provider
Acute monitoring of Cyber-physical Systems (CPS) in a multi-cloud environment is required in providing hazard-free computational facilities
Summary
Cloud computing refers to a virtual platform where users are permitted to handle necessary computational facilities, namely, servers, applications, storage spaces, and networks, remotely. CSPs generally offer cloud computing facilities that can be accessed from different types of interfaces such as desktops, laptops, tablets, and smartphones. The version of cloud computing, in particular multi-cloud computing, has got its entrance in the virtual world. Multi-cloud is a highly efficient and popular computing technology, appropriate security is still a concerning issue of this service. Intensive research investigations are going on to address security-related inefficiencies of a multi-cloud platform. Intellectual automation management and logical monitoring may be regarded as fruitful solutions in resolving these disadvantages of multi-cloud and introducing its upgraded version in the near future
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
More From: International Journal of Network Security & Its Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.