Enhancing Security and Privacy in Advanced Computing Systems: A Comprehensive Analysis

Authors

  • Carlos Mendoza University of Universidad Autónoma de Chiapas, Mexico Author
  •  Jorge Herrera University Universidad Autónoma de Chiapas, Mexico Author

DOI:

https://doi.org/10.69987/

Keywords:

Advanced computing systems, security, privacy, encryption, cloud computing

Abstract

The rapid growth of advanced computing systems, such as cloud, edge, and quantum computing, has transformed industries but also introduced significant security and privacy risks. As these systems become more interconnected, the potential for cyberattacks, data breaches, and unauthorized access increases, exposing weaknesses in traditional security approaches. This paper analyzes the unique security challenges posed by cloud computing (e.g., data ownership, multi-tenancy risks), edge computing (e.g., device-level attacks), and quantum computing (e.g., threats to cryptographic algorithms). It also addresses privacy concerns regarding data collection, processing, and compliance with regulations like GDPR and CCPA. To mitigate these challenges, the paper explores solutions such as zero-trust architectures, privacy-enhancing technologies (PETs), and post-quantum cryptography. A multi-layered security approach combining encryption, access control, and continuous monitoring is recommended. Future trends, including AI-driven security solutions and blockchain for decentralized security, are also discussed. By examining current vulnerabilities and forward-looking strategies, the paper highlights the importance of robust security measures to protect advanced computing systems and ensure their sustainable development in the digital economy.

Author Biography

  •  Jorge Herrera, University Universidad Autónoma de Chiapas, Mexico



Downloads

Published

2023-12-06

How to Cite

Carlos Mendoza, &  Jorge Herrera. (2023). Enhancing Security and Privacy in Advanced Computing Systems: A Comprehensive Analysis. Journal of Advanced Computing Systems , 3(12), 1-9. https://doi.org/10.69987/

Share