STUDYING CLOUD COMPUTING TECHNOLOGY COMPARATIVELY
Keywords:
Internet of Things (IoT), Cloud Technologies, Cyber-attacksAbstract
In order to provide quicker innovation, adaptable resources,and scale economies, cloud computing is the supply of computing services, including servers, storage, databases, networking, software, analytics, and intelligence, over the
Internet. As technology advanced in recent years, cloud technologies were increasingly utilized. Cloud technologies are appealing because data may be stored, transmitted to numerous locations at once, and accessed at any time. It is a system that enables data storage on the Internet, releasing users from the constraints of physical settings and storage devices and enabling access from any location at any time.
References
https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-about-the-cloud/.
https://www.investopedia.com/terms/c/cloud-computing.asp.3.M.KOCA,I. AVCI,“Security Vulnerabilities in Cloud Technology”,4thInternational Latin American Congresson Natural
and Applied Sciences, March 13-15,pp. 176-182, 2023.
P. Thakker, G. Japee, “Cloud-Based Accounting Technologies: Revolutionizing Financial Management”, International Journal of Science, Engineering and Management (IJSEM),Vol 10, Issue 6, pp. 20-26, June 2023.
M. Sharif, “Blockchain and Cloud: Exploring the Intersection of Two Revolutionary Technologies”,pp. 1-6,file:///C:/Users/mababalle/Downloads/4.2BlockchainandCloud.pdf.
Md. Tahmid, “Accounting in the Cloud: A New Era of Streamlining Accounting with Cloud Technology”,pp. 1-14, Journalof Cloud Computing, May 2023.
M.Balakrishnan, S.K.Soam, “CloudComputing Technologies and its Applications in Bioinformatics”,Information and Knowledge Management, pp. 93-100, 2023.
M. A. Baballe, A. Hussaini, M. I. Bello, U. S. Musa,” Online Attacks Types of Data Breach and CyberAttack Prevention Methods”, CurrentTrends in Information Technology, Volume 12, Issue 2, 2022, DOI (Journal):10.37591/CTIT.
M. A. Baballe, et al., “Management of Vulnerabilities in Cyber Security”, Global Journal of Research in Engineering &Computer Sciences ISSN: 2583-2727 (Online) Volume03| Issue 02 | March-April | 2023 Journal homepage:https://gjrpubl ication.com/gjrecs/.
. B. Ahmad, et al., “Need for Security Alarm System Installation and their Challenges Faced”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(3): 68-76 The Society of Digital Information and Wireless Communications, 2019.
. Çava?, M. B. Ahmad, “A Review Advancement of Security Alarm System using Internet of Things (IoT)”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(2): 38-49 The Society of Digital Information and Wireless Communications, 2019.
. B. Ahmad, et al., “The Various Types of sensors used in the Security Alarm system”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(2): 50-59 The Society of Digital Information and Wireless Communications, 2019.
ainab A., Amina I., Abdulmuhaimin M., M. A. Baballe, & Sadiku A. S. (2023). Contribution of the IoT to the Security System. Global Journal of Research in Engineering & Computer Sciences, 3(4), 1–4.https://doi.org/10.5281/zenodo.8161 017.
mina I., Sadiku A. S., Muntaka D., Abdulmuhaimin M., & M. A. Baballe. (2023). Modern Alarm Sensors for Security Systems. Global Journal of Research in Engineering & Computer Sciences, 3(4), 11–15.https://doi.org/10.5281/zenodo.81 93716.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties and that the Article has not been published elsewhere. Author(s) agree to the terms that the IPHO Journal will have the full right to remove the published article on any misconduct found in the published article.