ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on the Various Security Methods Imposed on Cloud

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.5, No. 4)

Publication Date:

Authors : ; ;

Page : 128-129

Keywords : Availability; Cloud Computing; confidentiality; Data outsourcing; Data Security; Sensitive data;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing makes use of computing resources that is hardware or software that are shared as services over the internet.In recent years, cloud computing has grown up rapidly because of the useful services provided by cloud. Data outsourcing in cloud is becoming more useful because of the storage services provided by the cloud computing. The size of the storage is increasing day by day. The outsourced data will get stored in different data centres present in all over the world. Protection of the outsourced sensitive data in cloud is major security challenge in cloud. Storing a large amount of confidential information on the cloud will help for the sniffers to miss use the data. Thus the security to be considered as one of the top issues while considering Cloud Computing. This survey paper aims to analyse various data storage security methods.

Last modified: 2021-07-08 16:00:07