Downloads: 106 | Views: 276 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.6 / 10
Investigation of Security in Cloud Computing
Annu Devi
Abstract: Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers; passwords; e-mails; personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up the integrity of the cloud data due to hacking or entry of unauthorized entities. The increased attack surface in a in a Cloud environment allows for other vulnerabilities to be exploited; thereby increasing the organizations risk. While Cloud services offer flexibility; scalability and economies of scale; there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud; the potential for personal and private data to be compromised will increase. Confidentiality; availability and integrity of data are at risk if appropriate measures are not put in place prior to selecting a Cloud vendor or implementing your own cloud and migrating to Cloud services. Cloud services such as Software as a service; Platform as a service or Infrastructure as a service will each have their own security concerns that need to be addressed. This paper reviews the best practices to secure Cloud services and data; including conventional security techniques and working with vendors to ensure proper Service Level Agreements exist.
Keywords: Cloud Computing, Encryption, Decryption, Threats, Public key, Private key, Cryptography
Edition: Volume 3 Issue 6, June 2014
Pages: 2025 - 2029
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia