Identification of Various Security Issues, Threats and A Novel Service Model in Cloud Computing
Nasreen Sultana Qadri1, Kusum Yadav2, Yogesh Kumar Sharma3
1Nasreen Sultana Quadri* Research Scholar in the Department of Computer Science in JJTU University, India.
2Dr. Kusum yadav, Associate Professor in the Department of Computer Science in Hail University, Hail, Saudi Arabia,
3Dr. Yogesh kumar Sharma, Associate Professor in the Department of Computer Science in JJTU University, India.
Manuscript received on September 26, 2020. | Revised Manuscript received on November 04, 2020. | Manuscript published on November 10, 2021. | PP: 321-325 | Volume-10 Issue-1, November 2020 | Retrieval Number: 100.1/ijitee.L32361081219| DOI: 10.35940/ijitee.L3236.1110120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.
Keywords: Security, Deployment, Adoption, Data, Threat, Cloud Computing.
Scope of the Article: Cloud Computing