Abstract

For large-scale companies or people that desire a range of system services at a cheap cost, cloud computing is now the most popular phenomena to use. Personal information is frequently kept in a public cloud that is open to the public. This fundamental raises a number of concerns about cloud providers' flexible services, including confidentiality, persistence, and endurance. The paper aims to better understand cloud components, security concerns, and dangers, as well as developing solutions that might help minimise cloud vulnerabilities. It is a well-known truth that the cloud has been a viable hosting platform since 2008; nevertheless, the view of cloud security is that it requires major changes in order to achieve higher rates of adaptability at the corporate scale. Many of the difficulties affecting cloud computing need to be rectified immediately. The industry has made tremendous progress in combating cloud computing risks, but there is still work to be done to reach the level of maturity that traditional/on-premise hosting has.

Highlights

  • Each day, everybody is linked one way or another to this digital world and it is the major cause for the rise of IT

  • A thorough examination of all current approaches for improving the security and privacy of consumer data housed in cloud computing platforms

  • The three cloud delivery models proposed by NIST and adapted by: Infrastructure as a Service (IaaS): This is a fantastic concept in which the cloud user creates the application without having to worry about the infrastructure

Read more

Summary

INTRODUCTION

Everybody is linked one way or another to this digital world and it is the major cause for the rise of IT. Cloud is a computer system based on the Internet that provides clients, on request, with common resources such as programs, framework, space and data. Many web‐ based data storage services and cloud computing platforms offer. Cloud computing offers its customers several advantages but, at the dark side of the computer, it suffers from many problems, including as integrity and storage correction. These problems make it relatively difficult for consumers to adopt the cloud environment. This requires a lot of study to establish confidence in cloud providers by cloud users

OBJECTIVES
LITERATURE SURVEY
CLOUD SERVICES
CLOUD MODELS
CLOUD SERVICE LIFECYCLE
VIII. SECURITY IMPLICATIONS BASED ON DEPLOYMENT AND DELIVERY MODELS
Cloud Deployment Model
Cloud Delivery Model
Vulnerabilities and Open Issues
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.