Abstract

Over the three industrial revolutions, man has achieved great achievements. But besides that great success will always go hand in hand with many problems that arise. Because the rate at which technology develops is directly proportional to the threats it poses. The emergence of new technology requires researchers and students to pay attention to discover new threats to make it reliable and user-friendly. In the meantime 4.0 cloud computing is a new technology model. Security issues in cloud computing are considered one of the biggest obstacles besides the broad benefits of cloud computing. New concepts introduced by the cloud create new challenges for the security community. Addressing these challenges requires, in addition to the ability to cultivate and adjust security measures developed for other systems, to propose new security policies, models and protocols to address optimal and effective cloud security challenges. In this article, we provide comprehensive research on cloud security including classification of known security threats and advanced practices in attempting to address these threats. The paper also provides classification dependency and provides solutions in the form of preventive action rather than proactive action.

Highlights

  • In the development era of Industry 4.0, people have step by step researched and developed and achieved outstanding achievements

  • The concept of cloud computing has emerged from the fields of distributed computing and the mesh has been used for servers, in web hosting, and hosting services

  • Cloud computing applications are deployed in a shared resource environment, so data security is a very important aspect

Read more

Summary

Introduction

In the development era of Industry 4.0, people have step by step researched and developed and achieved outstanding achievements. Besides the development of technology, there is always a shortcoming, especially the issue of user security and security in the current digital wait. Cloud computing technology is a broad model, based on the software and hosting service provisioning model as the foundation. The concept of cloud computing has emerged from the fields of distributed computing and the mesh has been used for servers, in web hosting, and hosting services. As defined by NIST, is called: A model that allows universal, convenient on-demand network access, into a group of configurable computing resources (e.g. network, machine servers, storage, applications, and services) may be promptly available and released with minimal administrative effort or service provider interaction [1]

Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call