A Review: Data Security in Cloud Computing Using Machine Learning

Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi
{"title":"A Review: Data Security in Cloud Computing Using Machine Learning","authors":"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi","doi":"10.1109/IC3I56241.2022.10072968","DOIUrl":null,"url":null,"abstract":"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"542 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
综述:使用机器学习的云计算数据安全
在今天的IT行业中,云计算和更广泛的云服务部门已经获得了广泛的接受。简而言之,云服务提供云计算,它允许通过互联网按需访问it资源,并采用基于订阅授权和集中托管的按使用付费定价模式。随着21世纪越来越数字化,对公共云服务的需求正以前所未有的速度增长。云计算使得通过互联网访问服务器、存储、数据库和各种应用服务变得容易。云环境支持各种优点,但也有一些缺点。尽管云服务提供商实施了最高的行业认证和安全要求,但在第三方服务提供商上存储敏感数据总是存在风险。在讨论数据安全性时,安全和隐私必须发挥重要作用,特别是在处理敏感数据时。为了解决这个问题,已经产生了许多解决方案。由于现有的解决方案缺乏分析,因此有必要对现有的重要工作进行发现、分类和分析。本文介绍并简要分析了在云环境中安全交换和保护数据的主要方法。对每种特定技术的讨论涵盖了其在数据保护中的作用,该领域的前瞻性和可靠的解决方案,范围,未来方向等。然后根据需求和结果探索方法的适用性和完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Role of Learning Management System for Evaluating Students’ progress in Learning Environment Detection of Malicious Social Bots with the Aid of Learning Automata on Twitter Review of Psychiatric Disorders in relation with Sleep Disturbances and the proposal of a Prediction System Fully Automated Clustering based Blueprint for Image Analysis A Brief Review of State-of-the-art Routing Methods in Wireless Sensor Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1