Abstract

Cloud computing is one of the popular topics of the current internet world. Cloud computing technology no doubt makes life simple and easier by offering computing, storage space, and many more services on demand over the internet but associated threats cannot be ignored while accessing these services online. Various efforts have been made by both user's end and cloud services provider to cope up with security issues. Various researches provide advanced defense mechanisms like cryptosystem authentication and intrusion detection system for the last 15 years. This study provides a critical analysis of the security strategies along with there’s role in circumventing threats. The main contribution of this paper is to make society, cloud users, and research scholars aware of the current scenario of widely used technologies. The critical analysis of prevailing approaches reveals the various used prospects which act as the solution essence against emerging attacks on the cloud, at a glance.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.