Deep Learning Approaches to Cloud Security. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Deep Learning Approaches to Cloud Security - Группа авторов страница 15

Deep Learning Approaches to Cloud Security - Группа авторов

Скачать книгу

href="#ulink_14671332-7b09-5626-a250-d1e520ed75e0">Figure 2.5 Concept of Cloud Security [7].

Schematic illustration of securities in Multi-Cloud environments.

Schematic illustration of multi-Tenancy services.

      The fourth step is encryption in a Multi-Tenant based system. In a Multi-Tenant based system, the consistency, integrity, durability, accuracy, and on-time demand of a database is mandatory for fulfilment. If the Multi-Tenant based system does not fulfil the requirements due to any term and condition, the tenant may not be able to work efficiently in the organisation, so encryption techniques based on Deep Learning concepts are used to secure the database. Some encryption techniques include digital, security, key, signature, digital key, private key, and password provided encryption [14].

      The authorised user accesses the sophisticated database and can modify the database. If unauthorised access happens, sophisticated data access by the unauthorized user can be added, deleted, and modified by unauthorised activity. In a Multi-Tenant system using encryption techniques, first check the authorisation, find out if the tenant is authorised or not, and if the tenant has been authorised as a user with the access provided.

      1. Abhishek Kumar & Jyotir Moy Chatterjee & Pramod Singh Rathore, 2020. “Smartphone Confrontational Applications and Security Issues,” International Journal of Risk and Contingency Management (IJRCM), IGI Global, vol. 9(2), pages 1-18, April.

      2. Bhargava, N., Bhargava, R., Rathore, P. S., & Kumar, A. (2020). Texture Recognition Using Gabor Filter for Extracting Feature Vectors With the Regression Mining Algorithm. International Journal of Risk and Contingency Management (IJRCM), 9(3), 31-44. doi:10.4018/IJRCM.2020070103

      3. By Judith Hurwitz https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/ by Judith Hurwitz, Marcia Kaufman, Fern Halper, Daniel Kirsch

      4. https://www.dummies.com/programming/cloud-computing/hybrid-cloud/multi-tenancy-and-its-benefits-in-a-saas-cloud-computing-environment/

Скачать книгу