پديدآورندگان :
Lashkaripour Zeinab z.lashkaripour@velayat.ac.ir Department of Computer, Faculty of Engineering, Velayat University, Iranshahr, Iran;
چكيده فارسي :
A third-party cloud environment is responsible for providing an on demand, elastic, cost effective and easy to manage service through the internet. Day by day the number of organizations or even individuals that switch to this novel information system is increasing which would require different levels of demands. In spite of having a broad number of advantages there are some issues and requirements that need a thorough inspection. Amongst them are security issues that are related to confidentiality, integrity and availability of assets on either side of the cloud system. So, as to be successful in preserving the security of the cloud environment it is vital to be aware of the security implications, attack and requirements therefore, in this paper we have tried to specify these aspects of a cloud system. The results indicate that the variety of technologies used in a cloud computing environment lead to a broad number of security requirements that need careful inspection