Fundamental and Comparative Study of Secure Cloud Computing
DOI:
https://doi.org/10.24113/ijoscience.v2i4.86Keywords:
Cloud, Security, Services, Issues, Architecture.Abstract
To reduce the cost of computing, Cloud computing has now one of the booming researching areas. Currently, the services that the Cloud computing is providing to its users are on demand over the internet, hence it is very persuading technology. As it stores data and the resources are distributed in the environment, so the security of the resources and data has become the major issue that is restricting the deployment of cloud computing environments. Various users are now using the cloud to store their data, such that the security of data storage is needed in this medium of storage. The basic objective of the cloud computing environment is providing security while storing the data on server of cloud. This paper is to review various techniques of security and issues from the aspect of both software and hardware for securing data in the cloud and targeted at improving the security of data and privacy preservation for the reliable environment of cloud. In this paper, it provides an approximate analytical research of the previous researches related to the security of data and techniques of privacy preservation that are used in cloud computing.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2016 Mahmood Mahmood

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.