Abstract
Rapid development in software technology and increase in efficiency of devices lead to finding new solutions for problems that corporations, companies, as well as common users of the cloud faced for years. Currently, most companies cannot imagine working without the cloud, where their data can be stored. One of the biggest issues concerning the cloud is the safety of its usage. The article shows various service and deployment models along with types of attacks.
References
[1] Aljawarneh S.: Cloud Computing Advancements in Design, Implementation and Technologies, Isra University, Jordan 2013.
[2] Mell P., Grance T.: The NIST Definition of Cloud Computing, National Institute of Standards and Technology, Gaithersburg 2011.
[3] Mather T., Kumaraswamy S., Latif S.: Cloud Security and Privacy. An Enterprise Perspective on Risks and Comliance, O’Reilly Media Inc. United States of America 2009.
[4] http://websecurity.pl/tag/chmura-zagrozenia/, [dostęp: 10.04.2017].
[2] Mell P., Grance T.: The NIST Definition of Cloud Computing, National Institute of Standards and Technology, Gaithersburg 2011.
[3] Mather T., Kumaraswamy S., Latif S.: Cloud Security and Privacy. An Enterprise Perspective on Risks and Comliance, O’Reilly Media Inc. United States of America 2009.
[4] http://websecurity.pl/tag/chmura-zagrozenia/, [dostęp: 10.04.2017].