International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1 | Views: 45 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science | United States of America | Volume 11 Issue 10, October 2022 | Popularity: 4.8 / 10


     

Analyzing Data Security Issues in Cloud Platforms Like AWS

Mohammed Sadhik Shaik


Abstract: Computing cloud services occurs during the transfer of services from a local machine to a remote server on a distributed platform. Platform as a service (PaaS), software as a service (SaaS), and infrastructure as a service (IaaS) are just a few of the many offerings from cloud service providers. The cloud server offers a variety of services, including data storage, resource sharing, and virtual computing. In the course of technically handling the difficulties, more infrastructure-related issues pop up. There are potential security dangers that users face when sending data using specific programs. Security concerns, such as denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, vulnerabilities in network communication, privacy concerns, incorrect cryptographic algorithm selection, and incorrect network design, are other internet dangers that might impact cloud services. Find out what kinds of attacks are possible on the cloud distributed platform when you use specific services. With an emphasis on data privacy in the cloud, we must ensure the services' security through authentication, access control, and data integrity. Confirm the existence of different cloud platform assaults and enhance the security events detected at the network layer. With the help of the AWS platform, the system can tailor its solutions to meet the needs of each client while also bolstering the cloud's security core in accordance with all applicable regulations (Vaibhav Sharma, et. al., 2020). Then, to safeguard the organization's data, components, and devices, AWS uses its datacentre to its full potential. Then, when paired with supply chain management, the cloud services offered by AWS can help the consumer.


Keywords: Denial of Services, Distributed System, Cloud Services, Attacks, AWS


Edition: Volume 11 Issue 10, October 2022


Pages: 1468 - 1472


DOI: https://www.doi.org/10.21275/SR22104145515



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Mohammed Sadhik Shaik, "Analyzing Data Security Issues in Cloud Platforms Like AWS", International Journal of Science and Research (IJSR), Volume 11 Issue 10, October 2022, pp. 1468-1472, https://www.ijsr.net/getabstract.php?paperid=SR22104145515, DOI: https://www.doi.org/10.21275/SR22104145515



Similar Articles

Downloads: 0

Review Papers, Computer Science, Trinidad and Tobago, Volume 12 Issue 12, December 2023

Pages: 727 - 733

Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming

Koffka Khan

Share this Article

Downloads: 1

Informative Article, Computer Science, India, Volume 11 Issue 3, March 2022

Pages: 1433 - 1434

Cyber Attacks on SCADA Systems

Shalini

Share this Article

Downloads: 1

Review Papers, Computer Science, India, Volume 11 Issue 5, May 2022

Pages: 283 - 286

Intrusion Detection using Machine Learning

Bhumika Malik, Nivedita Singh

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

New Innovation and Idea, Computer Science, India, Volume 11 Issue 6, June 2022

Pages: 401 - 404

A Trust Based Mechanism for Preventing Noncooperative Eaves Dropping in WSN

C. Nithya Praba, Dr. D. Kalaivani

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science, India, Volume 12 Issue 8, August 2023

Pages: 2125 - 2131

Enhancing Cloud Security: A Novel Approach to Intrusion Detection Using Feed Forward Neural Networks and Optimization Algorithm

Dr. N. Rajkumar, Dr. S. Megala

Share this Article
Top