Title :
Perusal about influences of cloud computing on the processes of these days and presenting new ideas about its security
Author :
Kashefi, Feraydune ; Majdi, Mojtaba ; Darbandi, Mehdi ; Purhosein, Hoda ; Alizadeh, Khalil ; Atae, Ozra
Author_Institution :
Dept. of Electr. Eng., Islamic Azad Univ., Shabestar, Iran
Abstract :
Cloud is a virtual image about an environment that it´s widespread and powers are unknown, and because of we haven´t any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing [1]. This technology presents lots of capabilities such as processing power, storage and accessing, supporting and etc. by the means of internet. Cloud computing is reliable services that presenting by next generation data centers and from internet, they based on virtual technologies and computes [4]. In recent decades the internet has very deep influences in human lives and in offer and demand conditions; lots of people for trading, reading the news, seeing the movies or to play online games go through the internet. As our daily needs from the internet became more, so that the processing power should increase significantly [8]. With remarkable developments of communication and information technology in recent days, we consider processing and processing power as the fifth vital instrument in human lives (after water, electricity, gas and telephone) [9]. These days lots of technologies migrate from traditional systems into cloud, we should note that cloud can be used for military and non-military purposes [3]. On the other hand, in such a large scale network we should consider the security of files and information, because if we tranquilize the people and organizations about the security of such networks they became more eager to migrate to this new technology. In this paper, at first we consider significant influences of this technology on some of the biggest companies and organizations all over the world, after that we present our new ideas about increasing security of such networks [1] to [6].
Keywords :
cloud computing; computer games; information technology; next generation networks; security of data; Internet; cloud computing; cloud location information; demand conditions; file security; information security; information technology; large scale network; military purpose; movies; news reading; next generation data centers; nonmilitary purpose; online games; service reliability; trading; virtual technology; Education; Europe; Green products; USA Councils; cloud computing and its influences; evolutionary algorithms; recognition methods; security;
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2011 5th International Conference on
Conference_Location :
Baku
Print_ISBN :
978-1-61284-831-0
DOI :
10.1109/ICAICT.2011.6111007