A Review on Cloud Computing Security and Privacy
Authors: Poonam Singh rajput, Deepak Mishra
Certificate: View Certificate
Abstract
this paper discussed about how data is kept safe in cloud computing. It is a study of data stored in the cloud and the security issues that come with it. The paper will go into depth about the methods and approaches to data security that is used all over the world to protect data as much as possible by reducing risks and threats. cloud computing has become increasingly popular in recent years as it offers many advantages such as scalability, cost efficiency, and accessibility from anywhere. However, storing data in the cloud also poses significant security risks that must be addressed to ensure the safety of data. One of the main security concerns when it comes to cloud computing is data privacy. When data is stored in the cloud, it is important to ensure that only authorized users have access to it. Encryption techniques can be used to protect data from unauthorized access by encrypting the data before it is stored in the cloud. Access controls and identity management systems can also be implemented to ensure that only authorized users can access the data. Another security concern is data integrity, which refers to the accuracy and completeness of data. Data can be corrupted, altered or deleted accidentally or maliciously, so it is essential to have measures in place to prevent such incidents. Data integrity can be ensured through data backups, checksums, and version controls. this paper literature about various cloud based techniques for privacy and security.
Introduction
The text must be in English. Authors whose English Cloud computing links together a lot of computing, storage, and software resources to make a huge pool of shared virtual resources from which users can buy services like electricity. As cloud computing apps have become more and more popular, they have spread into many different fields, such as scientific study, production, education, shopping, entertainment, etc. What you need to know about cloud computing The technology of virtualization in cloud computing gives end users access to useful resources. Cloud computing has features like being easy to control, scalable, and available. Cloud computing also has the benefits of being cheap, easy to use, global, having multiple tenants, being flexible, and being stable. Cloud computing mainly offers three service delivery models and four development patterns (http://www.cloudsecurityalliance.org/): infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), public cloud, private cloud, hybrid cloud, community cloud, and virtual private cloud
Conclusion
The movement towards better ways to store data in the cloud is getting stronger as more people use cloud computing to store data. Data that is stored in the cloud can be at risk if it is not protected properly. This paper gave a review of three types of security issues and talked about the risks and security threats to data in the cloud. Virtualization is looked at to see what dangers the host poses. Threats from Public cloud and multitenancy have also been talked about. One of the main points of this paper was the security of data in the cloud and how it can be threatened and how to fix that. We\'ve talked about data in different states and the best ways to secure data in the cloud. The study gave an outline of block cypher, stream cypher, and hash function, which are used to encrypt data in the cloud while it is at rest or in motion.
Copyright
Copyright © 2025 Poonam Singh rajput, Deepak Mishra. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.