Examining methods of preventing cyber attacks in mobile cloud processing
Author(s):
Article Type:
Research/Original Article (بدون رتبه معتبر)
Abstract:
In this article, security solutions for user information, software, available hardware and software resources, etc. have been reviewed. First of all, the concept of cloud computing and its types has been discussed, followed by the methods of preventing attacks, damages and examples of methods of creating security in cloud computing. Especially in mobile networks, which have recently been mentioned with the introduction of new operating systems and mobile social network software, which have relatively lower security than computer networks. In the conclusion section of this research, it is stated that due to the fact that most of the mobile structures and processing clouds are cross-border, it is necessary to strengthen and support the local infrastructure in this regard. Also, in the suggestions section, some possible suggestions are given, including 1- The expansion of mobile cloud services in the country, 2- Indirect monitoring of cloud service providers, 3- Creating a sense of trust in mobile cloud services that are offered inside the country.
Keywords:
Language:
Persian
Published:
Journal of North Khorasan Disciplinary Knowledge, Volume:10 Issue: 39, 2024
Pages:
43 to 54
https://www.magiran.com/p2719523
سامانه نویسندگان
مقالات دیگری از این نویسنده (گان)
-
Classification of cybercrimes based on crypto payments
Hadi Fakhari *
Journal of North Khorasan Disciplinary Knowledge, -
Investigating and classifying types of botnets in order to deal with and prevent cyber intrusion into computer networks
Hadi Fakhari *
Journal of North Khorasan Disciplinary Knowledge,