A Comprehensive Survey on Cloud Security Mechanisms
Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options. Cloud users are permitted to utilize cloud st...
Saved in:
Published in | 2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) pp. 471 - 475 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
13.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options. Cloud users are permitted to utilize cloud storage to store their data on the cloud server, which lessens the need for local computer storage and retrieval. Cloud computing is the set of the resources as well as the services that are offered to users through the Internet. There are several issues as well as challenges raised from the adoption of the computational paradigm which includes privacy, security, authentication and association. This paper aims to introduce new data security ideas in cloud computing. In this paper, we have described the specifics of cloud computing, addressed the principal security issues and discussed primary cloud operations that need to be secured and also discussed the data security-based model for cloud computing. Although advancing towards to the paradigm of on-demand operation, dynamic resource, and transferring it all to a cloud system, security is the main roadblock towards this grand approach of computational capacity. Additionally, various critical aspects such as information security practices, firewall-based protection, and access control procedures in the clouds also analyzed in depth. This study will benefit research and developing network algorithms to address recognized safety concerns, as well as businesses producing gadgets to monitor such dangers and potential vulnerabilities. |
---|---|
DOI: | 10.1109/ICACRS55517.2022.10028990 |