Abstract

One of the most popular IT subfields today is cloud computing. With a simple Internet connection, it enables users to access cutting-edge information, technology, and infrastructure. Because of the numerous benefits offered, most international organizations have started to move toward cloud computing environments during the last few decades. Companies and organizations find cloud computing appealing because it eliminates the need to plan for provisioning and enables them to start with modest resources and progressively raise them as service demand increases. Cloud computing presents opportunities for research as well as obstacles. The security and privacy of data in cloud systems are important issues. Now that cloud computing technology is developing quickly, it is more convenient for businesses to move their workload there. It asks for a smaller investment and guarantees quick delivery of cutting-edge technologies. Cloud security is of the utmost importance. It is susceptible to cyberattacks that exploit its vulnerabilities in an insecure cloud environment. This puts the cloud environment’s assets, resources, and data in danger. In this paper, we reviewed some cloud computing studies about various attacks on cloud computing services. This paper’s main objective is to give readers a better understanding of security issues and solutions.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.