A Survey on the Various Security Methods Imposed on Cloud
Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.5, No. 4)Publication Date: 2017-04-05
Authors : Deeksha K R; Sudheer Shetty;
Page : 128-129
Keywords : Availability; Cloud Computing; confidentiality; Data outsourcing; Data Security; Sensitive data;
Abstract
Cloud computing makes use of computing resources that is hardware or software that are shared as services over the internet.In recent years, cloud computing has grown up rapidly because of the useful services provided by cloud. Data outsourcing in cloud is becoming more useful because of the storage services provided by the cloud computing. The size of the storage is increasing day by day. The outsourced data will get stored in different data centres present in all over the world. Protection of the outsourced sensitive data in cloud is major security challenge in cloud. Storing a large amount of confidential information on the cloud will help for the sniffers to miss use the data. Thus the security to be considered as one of the top issues while considering Cloud Computing. This survey paper aims to analyse various data storage security methods.
Other Latest Articles
Last modified: 2021-07-08 16:00:07