Examining methods of preventing cyber attacks in mobile cloud processing

Author(s):
Message:
Article Type:
Research/Original Article (بدون رتبه معتبر)
Abstract:
In this article, security solutions for user information, software, available hardware and software resources, etc. have been reviewed. First of all, the concept of cloud computing and its types has been discussed, followed by the methods of preventing attacks, damages and examples of methods of creating security in cloud computing. Especially in mobile networks, which have recently been mentioned with the introduction of new operating systems and mobile social network software, which have relatively lower security than computer networks. In the conclusion section of this research, it is stated that due to the fact that most of the mobile structures and processing clouds are cross-border, it is necessary to strengthen and support the local infrastructure in this regard. Also, in the suggestions section, some possible suggestions are given, including 1- The expansion of mobile cloud services in the country, 2- Indirect monitoring of cloud service providers, 3- Creating a sense of trust in mobile cloud services that are offered inside the country.
Language:
Persian
Published:
Journal of North Khorasan Disciplinary Knowledge, Volume:10 Issue: 39, 2024
Pages:
43 to 54
https://www.magiran.com/p2719523  
سامانه نویسندگان
  • Fakhari، Hady
    Author
    Fakhari, Hady
    MSc Graduated cyberpolice, Amin Police University, تهران, Iran
اطلاعات نویسنده(گان) توسط ایشان ثبت و تکمیل شده‌است. برای مشاهده مشخصات و فهرست همه مطالب، صفحه رزومه را ببینید.
مقالات دیگری از این نویسنده (گان)