This article presents a cloud computing adoption framework (CCAF) security suitable for business clouds. CCAF multilayered. Security is based on the development and integration of three major security technologies: firewall identity management,,, And encryption based on the development of enterprise file sync and share technologies. This article presents, the vision. Related works and views, on security framework. Core technologies have been explained, in detail and experiments were designed. To demonstrate the robustness of the CCAF multilayered security. In penetration testing CCAF multilayered, security could. Detect and block 99.95% viruses, and Trojans and could achieve > = 85% of blocking for 100 h of continuous attack. Detection. And blocking took View the MathML source / Trojan or virus. A full CCAF multilayered security protection could block all SQL. (Structured Query Language), injection providing real protection to data. CCAF multilayered security did not report any. False alarm. All F-measures for CCAF test results were > = 99.75%. The mechanism of blending of CCAF multilayered security. With policy real services, and business, activities has been illustrated. Research contributions have been justified and. CCAF multilayered security can be beneficial, for volume velocity and veracity, of big data services operated in the cloud.
การแปล กรุณารอสักครู่..