Abstract

AbstractIn terms of computing services, cloud computing has expanded significantly. It is a set of computing tools that may be accessed through the Internet. The cloud computing security, a field rife with challenges and critical significance, is still in its early stages of growth, and many research questions remain unanswered. The IT industry has benefited immensely from cloud computing. It is like the next step in the development of the Internet, with a controlled and powerful data storage network with enormous capabilities and applications. It allows authorities to gain access to a user's file or data without having to install the information on the user's computer using Internet services. Cloud computing allows for on-demand community access or pooled access to computing resources that have been configured. Having multiple operating systems on a computer allows you to get the most out of that resource. It refers to the development of virtual version resources such as storage devices, a virtual operating system, or the deployment of an application or software on the cloud in this context. Cloud computing is no exception; it has both advantages and disadvantages. Cloud protection, manageability, honesty, fraud, data loss, and other issues are some of the implications. In the presented paperwork, we reviewed different challenges and issues faced in the data security over cloud with an objective to identify security challenges for adapting cloud computing.KeywordsCloud computingSecurity services and policesClient management issuesCloud configuration and exploitation of authentication

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.