Survey on Centric Data Protection Method for Cloud Storage Application | IEEE Conference Publication | IEEE Xplore

Survey on Centric Data Protection Method for Cloud Storage Application


Abstract:

IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker ...Show More

Abstract:

IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a "pay as you go" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.
Date of Conference: 26-27 November 2021
Date Added to IEEE Xplore: 07 February 2022
ISBN Information:
Conference Location: Nagpur, India

Contact IEEE to Subscribe

References

References is not available for this document.