International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 284

Research Paper | Computer Science & Engineering | United States of America | Volume 9 Issue 5, May 2020 | Popularity: 6.3 / 10


     

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani


Abstract: After the invention of cloud computing technology, the concept of building computer system with unlimited resources becomes more simplified. With cloud computing, business owners, can manage and share their information through business organization from anywheretwenty-four hours a day. Organization and business area which are using cloud services must be aware of their information policy, involving data privacy, reliability and security. Building cloud computing system will exposetheir information that are accessed by authorized people to hazard if they did not buildstrong secure system to increase their security level and protect it by authorizing only people who need to access them. The goal of this research paper is to give short vision of cloud computing concept by identifying their different types and discuss cloud security main issues to attract both users and business owner attention to the potential risks of sharing their important data through cloud system without knowing security limitations for each model and secure their system by overcome potential threats for their cloud system.


Keywords: Attacks, Cloud Security, Cloud Attacks, Cloud Privacy, Security and Privacy in Cloud, Security Analysis on Cloud, Cloud Deployment Models, Cloud Characteristics, Data Privacy


Edition: Volume 9 Issue 5, May 2020


Pages: 1472 - 1477



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Amal Matrouk Aljohani, "Cloud Computing Security Issues and their Data Privacy Concerns", International Journal of Science and Research (IJSR), Volume 9 Issue 5, May 2020, pp. 1472-1477, https://www.ijsr.net/getabstract.php?paperid=SR20523084823, DOI: https://www.doi.org/10.21275/SR20523084823



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023

Pages: 998 - 1004

AI-Infused Threat Detection and Incident Response in Cloud Security

Sumanth Tatineni

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023

Pages: 2074 - 2078

DevSecOps: Integrating Security into the DevOps Pipeline

Dinesh Reddy Chittibala

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 213 - 217

An Automated Data Deletion: A Secure Method for Multi-Cloud Security with Intrusion Detection System

Jashanbir Singh, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024

Pages: 862 - 868

Cybersecurity Tool Rationalization: A Strategic Approach to Optimizing Cybersecurity Infrastructure with Machine Learning Integration

Mohammad Usama Qureshi, Akshat Kumawat, Yash Saxena

Share this Article



Top