Enviar búsqueda
Cargar
How secured and safe is Cloud?
•
0 recomendaciones
•
4 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V9/i4/IRJET-V9I438.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 3
Descargar ahora
Descargar para leer sin conexión
Recomendados
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
improve cloud security
improve cloud security
Balkees Shereek
Ad4502189193
Ad4502189193
IJERA Editor
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
Recomendados
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
improve cloud security
improve cloud security
Balkees Shereek
Ad4502189193
Ad4502189193
IJERA Editor
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
Fog computing document
Fog computing document
sravya raju
fog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
Fog doc
Fog doc
priyanka reddy
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Más contenido relacionado
Similar a How secured and safe is Cloud?
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
Fog computing document
Fog computing document
sravya raju
fog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
Fog doc
Fog doc
priyanka reddy
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET Journal
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
Similar a How secured and safe is Cloud?
(20)
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
Fog computing document
Fog computing document
fog computing provide security to the data in cloud
fog computing provide security to the data in cloud
Fog doc
Fog doc
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
mulugeta48
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Último
(20)
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
University management System project report..pdf
University management System project report..pdf
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
How secured and safe is Cloud?
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 197 How secured and safe is Cloud? Menon Sanoop Govindankutty Student, M. Sc IT, Keraleeya Samajam(Regd.) Dombivli’s Model College, Maharashtra ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cloud Computing is the one of the hot and high value topic in the IT industry. Cloud computing provide a new method of delivering computing resources. Cloud computing resources includes data storage, processing to software, customer relationship management etc. The goal of cloud computing for private or public is to provide easy andscalable services to the IT industry. In simple words the delivery of software, storage, network, analytics and intelligenceoverthe internet to provide faster, economic and flexible service to the client. Amazon rollout the first kind of cloud in 2006 afterthat many companies like Google, Oracle, Azure, IBM any many provide the cloud services. Services provided by cloud providers are Paas (Platform as a Service), Saas(Softwareasa Service), Iaas (Infrastructure as a Service). Virtualization is the one of the main keyword found in the cloud world. Virtualization is creation of virtual servers, infrastructureand computing. Virtualization is the one of the foundational element in the cloud computing. As all industries are moving into cloud the security is also as important and this research paper is going to check how safe is cloud? Key Words: Cloud computing, Virtualization, Security, AWS, AZURE, IAAS, PAAS, SAAS. 1.INTRODUCTION Cloud computing is a general term for anythingthatinvolves providing the on demand services to end users over the internet. If a individual starts a business at early stage the resources used will be less as the number of employees are hand countable, but as the business grow the need of resources and count of employees increases. For that the system, network, data storage and servers will also be needed for the business. The resources to maintain, planning, security need to be paidsotheexpenseofcompany will also increase as per growth. There will be many un wanted expenses due to resource wastages etc. To solvethis problem cloud computing play a major role. A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people, with certain access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services[1]. Cloud computing allows you to pay only for how much you use with much faster provision.CloudComputingsystem are maintained by the cloud providers so the user doesn’t have to worry about the maintenance 1.1 How Cloud Computing works? Cloud computing heavily depends on Virtualization and automation. This helps users to utilize the services from any where in the world on their system over the internet. The users have to pay only to the services they are using instead of spending a large amount of money in the implementation and maintaining thesetupbythemselves.Theycanaccessthe data, servers sitting anywhere in the world. 2. TYPES OF CLOUD COMPUTING SERVICES. Cloud computing services are divided in to three categories Iaas- It stands for Infrastructure as a Service. Iaas provides computing architecture and infrastructure. Data storage, virtualization, servers and networking are taken care by the providers and is managed by the user application, middleware and data. Vendors manageaboveresources.Iaas is used by system administrators. Pros of Iaas is cloud provides the infrastructure,enhancedscalabilityandflexible. But the issue faced for the Iaas is service delays, network delays and security delays. Paas- It stands for Platform as a service. In Pass the services provided are Programming language, Operating system, Server and Database. It provides with encapsulation.Andthe user can build, compile and run programs. This services are managed by the users they manage data and application resources. This service is used by the developers. Common PaaS products include Salesforce's Lightning Platform, AWS Elastic Beanstalk and Google App Engine. It is faster market fordevelopers, easy deployment of web application. It iscost effective and scalable. The issues faced for these services are developers limited, migration issue and vendor lock-in. Saas- Saas stands for Software as a service. In Saas cloud providers provide the software as a service to the end users. It is based on demand services, the service are provided to Cloud computing works by enabling the services through a remotephysical servers, database and computers to access data and cloud applicationoverinternet.Aninternetnetwork connection provide the front end, which includes the accessingclient device, browser,networkandcloudsoftware applications, with the back end, which consists of databases, servers and computers. The back end functions provide repository, storing data that is accessed by the front end.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 198 customer on demand for the software. The user do not need to install the software on personal system. The user does not have to worry about the OS the user is using because it is universally accessible from any platform. Vendors Provide the modest and latest tools and allow multi-tenancy. The issue faced by user for this services can be portability, internet issue the size of software depends on its purpose so some heavy software need strong internet. Deployment Model- There are 3 type of deployment model 1. Public cloud- In public model the providers provide the services like application, storage in general over the internet. It is easy and inexpensive to setup. No wasted resources as users have to pay as pertheuse only. But as this is public cloud security and privacy is a big concern if not managed properly. 2. Private cloud- In private cloud the resources are accessible for only limited number of public behind the firewall, so it minimizes the security concern. It is mainly used by organizations and it gives direct control over data. 3. Hybrid cloud- In Hybrid cloud it is amixofprivateas well as public. And It helps toget bestofbothprivate and public cloud. 3. SECURITY CONCERN IN CLOUD Virtualization is a technique in which a fully functional image of an operating system can be captured and run on the users physical machine. Hypervisor is required to run a virtual operating system in a virtual machine.And if the Hypervisor is vulnerable then the whole system can be compromised and hence the users data can be breached. Another risk involved with virtualization is with allocation and de-allocation of resources. If the memory is allocated to a user and after the use of that client and the same memory is allocated to another user without cleaning the memory then there is a possibility of the data exposure so the allocation and de-allocation is a big part of virtualization. So the proper planning of virtualization should be done. Resources should be properly verified and authenticated should be done before de-allocatedto the users Storage in public cloud is another concern of security in cloud. In public cloud storage facilities are centralized and this attract hackers much often. This is a combination of hardware and software which make little complex design. A single loop hole canlead to compromise the publiccloud.Suggestion for this issue is to use Private cloud if the data is highly sensitive. Multienancy is also considered as one the security concern by experts. The main advantage of cloud is that users can access or rent the resources when they need and only pay for that after that if any another user need the resource, then the infrastructure is used by another user. And this also led to a major security concern. The same storage, CPU, memory are shared to different users which make not only one but multiple users vulnerable. To avoid such issue a highly strong authentication should be done before sharing the resources to another users. 4. DATA SECURITY There are two states where data is vulnerable in cloud. They are data at rest and data in transit. Data security is a big and major concern. Confidentiality and Integrity of data is based on mechanism such as encryption and decryption etc. Data at rest Data at rest means data present in cloud. Data present in cloud can be accessed through internet. This data can be backup or live data. If the functionality have any loop hole this data can be breached easily. Theorganizationcannotcontrolthe data physically so this is a big concern. This can be counter by using privatecloud with morecontrolled access. Data in Transit Data in transit means data travelling in and out of cloud. And it is more vulnerable than data at rest. Data in transit can be files, username, password etc. As the data is traveling from one place to other an intervention can cause majorsecurityconcern.Data in transit can be securedthroughdataencryption.So that if the data is eavesdropped still the data cannot be read by the intruder.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 199 5. SECURITY CHALLENGES Securing cloud will be a big challenge for the organization. Hence it is very important to mimic the securityvulnerability and create a good strong security model to establish in safe cloud environment. Major challenges involve: Lack of proper governance- Cloud providing organization havethecompletecontrolonresources but they have to provide the control to users once the resources is shared this can cause a big security gap. Google, Amazon and other cloud providers states thattheydon’ttakeanyresponsibility,liability or authority forcorruption,unauthorizedetc.Sothis is a big major concern for the users. Malicious attack- Sometimes the architecture of cloud computing environments poses risks to the privacy and security of the customers [2] Insecureor incomplete data deletion- Ifclientwants to deletethe data will it delete the dataaccuratelyor it will just delete incompletely and which it will make a big data security concern due to multi- latency. Data interception- This treat poses more as more third part software and malicious codes are available for sniffing, spoofing etc. 6. CONCLUSION Cloud computing are growing in faster rate. All type of industries are accepting the cloud computing technology. Data present in the cloud can be at high risk if the data is not protected properly. This paper discuss about data security, security concern and virtualization. This paper also discussed about the two states data at rest and data in transit. REFERENCES [1] https://www.techtarget.com/searchcloudcomputing/de finition/cloudcomputing#:~:text=Cloud%20computing %20is%20a%20general,as%20a%20service%20(SaaS). [2] Wang, Y., Chandrasekhar, S., Singhal, M., & Ma, J. (2016). A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Cluster Computing,19(2), 647-662. doi:10.1007/s10586-016- 0560-2
Descargar ahora