info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

A Review on Cloud Computing Security and Privacy

Authors: Poonam Singh rajput, Deepak Mishra

Certificate: View Certificate

Abstract

this paper discussed about how data is kept safe in cloud computing. It is a study of data stored in the cloud and the security issues that come with it. The paper will go into depth about the methods and approaches to data security that is used all over the world to protect data as much as possible by reducing risks and threats. cloud computing has become increasingly popular in recent years as it offers many advantages such as scalability, cost efficiency, and accessibility from anywhere. However, storing data in the cloud also poses significant security risks that must be addressed to ensure the safety of data. One of the main security concerns when it comes to cloud computing is data privacy. When data is stored in the cloud, it is important to ensure that only authorized users have access to it. Encryption techniques can be used to protect data from unauthorized access by encrypting the data before it is stored in the cloud. Access controls and identity management systems can also be implemented to ensure that only authorized users can access the data. Another security concern is data integrity, which refers to the accuracy and completeness of data. Data can be corrupted, altered or deleted accidentally or maliciously, so it is essential to have measures in place to prevent such incidents. Data integrity can be ensured through data backups, checksums, and version controls. this paper literature about various cloud based techniques for privacy and security.

Introduction

The text must be in English. Authors whose English Cloud computing links together a lot of computing, storage, and software resources to make a huge pool of shared virtual resources from which users can buy services like electricity. As cloud computing apps have become more and more popular, they have spread into many different fields, such as scientific study, production, education, shopping, entertainment, etc. What you need to know about cloud computing The technology of virtualization in cloud computing gives end users access to useful resources. Cloud computing has features like being easy to control, scalable, and available. Cloud computing also has the benefits of being cheap, easy to use, global, having multiple tenants, being flexible, and being stable. Cloud computing mainly offers three service delivery models and four development patterns (http://www.cloudsecurityalliance.org/): infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), public cloud, private cloud, hybrid cloud, community cloud, and virtual private cloud

Conclusion

The movement towards better ways to store data in the cloud is getting stronger as more people use cloud computing to store data. Data that is stored in the cloud can be at risk if it is not protected properly. This paper gave a review of three types of security issues and talked about the risks and security threats to data in the cloud. Virtualization is looked at to see what dangers the host poses. Threats from Public cloud and multitenancy have also been talked about. One of the main points of this paper was the security of data in the cloud and how it can be threatened and how to fix that. We\'ve talked about data in different states and the best ways to secure data in the cloud. The study gave an outline of block cypher, stream cypher, and hash function, which are used to encrypt data in the cloud while it is at rest or in motion.

Copyright

Copyright © 2025 Poonam Singh rajput, Deepak Mishra. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS215

Publish Date: 2023-06-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service