Abstract

Cloud Computing is the most advanced technical platform for next generation. Cloud Computing provide us a large range of data storage space in web source. Cloud Computing work automatically as per the need of user we don’t need to do extra work on it. High level applications and game is run by Cloud Computing. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. Cloud Computing cover the wide range of areas. It provides its service through online net connection. The data can be anything such as music, files, images, documents, and more. The user can access the data from anywhere just with the help of an internet connection. To use cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as the capacity of the server, internet speed, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and we also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.