International Journal of Scientific Engineering and Research (IJSER)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed | ISSN: 2347-3878


Downloads: 0

India | Computer Science | Volume 5 Issue 4, April 2017 | Pages: 128 - 129


A Survey on the Various Security Methods Imposed on Cloud

Deeksha K R, Sudheer Shetty

Abstract: Cloud computing makes use of computing resources that is hardware or software that are shared as services over the internet.In recent years, cloud computing has grown up rapidly because of the useful services provided by cloud. Data outsourcing in cloud is becoming more useful because of the storage services provided by the cloud computing. The size of the storage is increasing day by day. The outsourced data will get stored in different data centres present in all over the world. Protection of the outsourced sensitive data in cloud is major security challenge in cloud. Storing a large amount of confidential information on the cloud will help for the sniffers to miss use the data. Thus the security to be considered as one of the top issues while considering Cloud Computing. This survey paper aims to analyse various data storage security methods.

Keywords: Availability, Cloud Computing, confidentiality, Data outsourcing, Data Security, Sensitive data



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top