A Comprehensive Survey on Cloud Security Mechanisms

Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options. Cloud users are permitted to utilize cloud st...

Full description

Saved in:
Bibliographic Details
Published in2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) pp. 471 - 475
Main Authors Hakani, Dhwani, Mann, Palvinder Singh
Format Conference Proceeding
LanguageEnglish
Published IEEE 13.12.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options. Cloud users are permitted to utilize cloud storage to store their data on the cloud server, which lessens the need for local computer storage and retrieval. Cloud computing is the set of the resources as well as the services that are offered to users through the Internet. There are several issues as well as challenges raised from the adoption of the computational paradigm which includes privacy, security, authentication and association. This paper aims to introduce new data security ideas in cloud computing. In this paper, we have described the specifics of cloud computing, addressed the principal security issues and discussed primary cloud operations that need to be secured and also discussed the data security-based model for cloud computing. Although advancing towards to the paradigm of on-demand operation, dynamic resource, and transferring it all to a cloud system, security is the main roadblock towards this grand approach of computational capacity. Additionally, various critical aspects such as information security practices, firewall-based protection, and access control procedures in the clouds also analyzed in depth. This study will benefit research and developing network algorithms to address recognized safety concerns, as well as businesses producing gadgets to monitor such dangers and potential vulnerabilities.
DOI:10.1109/ICACRS55517.2022.10028990