Study on Security Controversies and Techniques in Cloud Computing

Cholleti Jyothi, Paladi Bhavani

Abstract


Cloud computing have turn out to be a popular slogan in IT industry as area of computer technology. On behalf of growing the infrastructure at low-cost cost, universally the organizations are moving to cloud based system. Cloud computing decreases the client organization having the complete physical infrastructure of software and hardware. However, with all strength and flexibility provided by cloud there are some concerns regarding security which may turn out to be a resilient obstruction. Service providers have been geographically dispersed due to enhanced migration of organization from traditional system to the cloud. Hence the data are usually stored in the servers that are remotely located at various places and unauthorized parties may have access to those data which directs to various security issues like data availability, data leakage, resource pooling, diffident interface, cloning, allocation of data and some attacks in the interior. This paper presents a review on the security issues in security standards followed in cloud, infrastructure, access control, third party privacy, confidentiality, reliability and integrity of data. It portrays the techniques employed in addressing cloud security issues and its challenges.

 

Index Terms Cloud computing, Service provider, Cloning, Infrastructure. Cloud Security.

 


Full Text:

PDF




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org