Data Security In Cloud Computing: A Review

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 2

Abstract

Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Cloud computing uses the internet and the central remote servers to support different data and applications. It is an internet based technology. It permits the users to approach their personal files at any computer with internet access. The cloud computing flexibility is a function of the allocation of resources on authority’s request. Cloud computing provides the act of uniting. Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of CloudComputing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include securityaspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified. This non-existence of global standards and guidelines could be help academics to know the state of practice and formulatebetter methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.

Authors and Affiliations

Gurjeet Singh, Dr. Mohita Garg

Keywords

Related Articles

A Novel Approach of Stability Awareness Routing in MANETs

In this paper, we introduce a novel approach of stabilityawareness routing for efficient utilization of Bandwidth by useof Bandwidth Threshold. Earlier work on routing in MANETshad resulted in several routing protocols w...

On the Theory of NP-Complete Problems

It is shown that the theory of NP -сomplete problems can't be used for the analysis of optimizing tasks.

Role of Taxation in Formulation of Fiscal Plan (Case study of Pakistan)

Research on the role of taxation in formulation of fiscal plan was started from the idea of data collection from the ministry of finance government of Pakistan for the purpose of checking the inter correlation and degree...

MESSAGE GUIDED RANDOM AUDIO STEGANOGRAPHY USING MODIFIED LSB TECHNIQUE

Steganography is the science of hiding secret data in such a way that its presence can't be noticed. Techniques which hide more secret data in cover files and which doesn't affect transparency of cover signal are better...

Finding a Weighted Positive In uence Dominating Set in E-learning Social Networks

Online social network has developed significantly in recent years. Most of current research has utilized the property of online social network to spread information and ideas. Motivated by the applications of dominating...

Download PDF file
  • EP ID EP649752
  • DOI 10.24297/ijct.v17i2.7551
  • Views 101
  • Downloads 0

How To Cite

Gurjeet Singh, Dr. Mohita Garg (2018). Data Security In Cloud Computing: A Review. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 17(2), 7206-7214. https://europub.co.uk./articles/-A-649752