{"title":"Survey on Centric Data Protection Method for Cloud Storage Application","authors":"N. Sultana, K. Srinivas","doi":"10.1109/iccica52458.2021.9697235","DOIUrl":null,"url":null,"abstract":"IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a \"pay as you go\" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccica52458.2021.9697235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a "pay as you go" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.