Abstract

Cloud computing is a technology that offers hardware and software resources as services over a network. Cloud computing provides wide range of services that are easily used over a network. One of the major characteristics of the cloud services is that users data are processed on unknown remote severs that users do not operate, then it will be a considerable roadblock in using all available cloud services. Data stored on Servers generally located in the country of the service providers. The on-line service is provided by a cloud service provider (CSP). Cloud computing enables highly scalable services to be easily consumed over the internet on an as needed basis. In cloud computing environment resources are shared among various clients and it's important for cloud provider to allocate the necessary resources for the clients. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. One of the threats in cloud computing is cloud security. Even though virtualization and cloud computing is a benefit to the IT and its users Security threats must be overcome to fully benefit with the cloud computing. Here we have tried to assess Cloud Storage Methodology and Security in cloud by the Implementation of Maas and juju with the help of foxiproxy. By using these we encrypt and secure the data before transferring to the network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call