Downloads: 1 | Views: 45 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science | United States of America | Volume 11 Issue 10, October 2022 | Popularity: 4.8 / 10
Analyzing Data Security Issues in Cloud Platforms Like AWS
Mohammed Sadhik Shaik
Abstract: Computing cloud services occurs during the transfer of services from a local machine to a remote server on a distributed platform. Platform as a service (PaaS), software as a service (SaaS), and infrastructure as a service (IaaS) are just a few of the many offerings from cloud service providers. The cloud server offers a variety of services, including data storage, resource sharing, and virtual computing. In the course of technically handling the difficulties, more infrastructure-related issues pop up. There are potential security dangers that users face when sending data using specific programs. Security concerns, such as denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, vulnerabilities in network communication, privacy concerns, incorrect cryptographic algorithm selection, and incorrect network design, are other internet dangers that might impact cloud services. Find out what kinds of attacks are possible on the cloud distributed platform when you use specific services. With an emphasis on data privacy in the cloud, we must ensure the services' security through authentication, access control, and data integrity. Confirm the existence of different cloud platform assaults and enhance the security events detected at the network layer. With the help of the AWS platform, the system can tailor its solutions to meet the needs of each client while also bolstering the cloud's security core in accordance with all applicable regulations (Vaibhav Sharma, et. al., 2020). Then, to safeguard the organization's data, components, and devices, AWS uses its datacentre to its full potential. Then, when paired with supply chain management, the cloud services offered by AWS can help the consumer.
Keywords: Denial of Services, Distributed System, Cloud Services, Attacks, AWS
Edition: Volume 11 Issue 10, October 2022
Pages: 1468 - 1472
DOI: https://www.doi.org/10.21275/SR22104145515
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Review Papers, Computer Science, Trinidad and Tobago, Volume 12 Issue 12, December 2023
Pages: 727 - 733Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming
Koffka Khan
Downloads: 1
Informative Article, Computer Science, India, Volume 11 Issue 3, March 2022
Pages: 1433 - 1434Cyber Attacks on SCADA Systems
Shalini
Downloads: 1
Review Papers, Computer Science, India, Volume 11 Issue 5, May 2022
Pages: 283 - 286Intrusion Detection using Machine Learning
Bhumika Malik, Nivedita Singh
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
New Innovation and Idea, Computer Science, India, Volume 11 Issue 6, June 2022
Pages: 401 - 404A Trust Based Mechanism for Preventing Noncooperative Eaves Dropping in WSN
C. Nithya Praba, Dr. D. Kalaivani
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science, India, Volume 12 Issue 8, August 2023
Pages: 2125 - 2131Enhancing Cloud Security: A Novel Approach to Intrusion Detection Using Feed Forward Neural Networks and Optimization Algorithm
Dr. N. Rajkumar, Dr. S. Megala