{"title":"Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare","authors":"G. C. Kumar, D. Prasad, V. Rao, N. Sai","doi":"10.1109/ICIRCA51532.2021.9544895","DOIUrl":null,"url":null,"abstract":"The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIRCA51532.2021.9544895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.