- Crossref DOI Prefix: 10.31695/IJASRE
- ISSN: 2454 - 8006
- Email: firstname.lastname@example.org
International Journal of Advances in Scientific Research and Engineering-IJASRE
Users versus Cloud Service Providers, on the Trust, Threats, Confidentiality and Reliability in Using Cloud Computing Services
Article Category: Computer science engineering
Author: OKONKWO NGOZI U,DR. MRS A.AJIBOLA
Abstract: Cloud Computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common protocol and networking standards. Cloud computing, abstracts the details of system implementation from users and developers. Cloud computing is portioned in three different types of service provision. In each case, the service is hosted remotely and accessed over the network (usually the internet) through software called a web browser, rather than been installed locally on a customer’s computer. the first among the service is; SaaS (Software as a service), which refers to the provision of software in the cloud. Secondly, PaaS (Platform as a service), refers to the provision of service that enables customers to deploy in the supply. Thirdly, IaaS (Infrastructure as a service) refers to services providing computer processing power, storage space and network capacity, which enables customers to run arbitrary software (including operating systems and network applications) in the cloud. Moreover, there is a need for cloud computing in society today to obtain an optimum service. APA referencing format was used to acknowledge those who have done some work in this area. The method adopted for the analysis of the system in this project work questionnaire development is sampling and data collection. The intention of this project work is of two folds; first; to identify the level of trust the users have in using cloud computing services; secondly; to identify the societal challenges for adopting cloud computing, and the solutions from real-world for the challenges that do not have proper mitigation strategies identified through literature review.
Keyword: Cloud, Cloud Services, web hosting, Mitigation Techniques, Secure Socket Layer, Virtual Private Network.
Copyright © 2018 IJASRE All Rights Reserved