Survey of Cloud Computing Security and Privacy Issues
DOI:
https://doi.org/10.36676/dira.v12.i3.63Keywords:
Cloud Computing, Security, Privacy, National Institute of Standards and Technology (NIST), Cloud Infrastructure, Insider ThreatsAbstract
The world of computing and data management has completely changed as a result of cloud computing, which offers both consumers and enterprises scalable resources, on-demand services, and considerable cost savings. The demand for more adaptable and effective computer resources has prompted this paradigm change, and cloud computing provides it by enabling users to access and utilize computing resources over the internet. But using cloud computing also raises a number of security and privacy issues that must be properly handled. In order to assess the present status of cloud computing security and privacy problems, this article will examine key terms, the development of the technology, its significance, current research gaps, and the urgent need for more in-depth analysis.
References
Crossler, R.E. and Bélanger, F., 2017. The mobile privacy-security knowledge gap model: Understanding behaviors.
Indu, I. and Anand, P.R., 2015, December. Identity and access management for cloud web services. In 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS) (pp. 406-410). IEEE.
Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, pp.38-54.
Vinayak Pillai . "Enhancing Transparency and Understanding in AI Decision-Making Processes" Iconic Research And Engineering Journals Volume 8 Issue 1 2024 Page 168-172
Sanju Purohit, “Role of Industrialization and Urbanization in Regional Sustainable Development – Reflections from Tier-II Cities in India”,vol 12(10), pp. 13484-13493 ,2023, doi: 10.48047/ecb/2023.12.10.9442023.02/09/2023.
Website: https://peoplactive.com/blog/cryptography-in-cloud-computing/
Website: https://us.norton.com/blog/privacy/cloud-security-risks
Zhou, M., Zhang, R., Xie, W., Qian, W. and Zhou, A., 2010, November. Security and privacy in cloud computing: A survey. In 2010 sixth international conference on semantics, knowledge and grids (pp. 105-112). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.