IJFANS International Journal of Food and Nutritional Sciences

ISSN PRINT 2319 1775 Online 2320-7876

Security Threats, Encounters and Solutions in Cloud Computing

Main Article Content

ASHUTOSH BHATT1, Dr Ganesh Kumar2, Dr.Shambhoo Prasad3

Abstract

Cloud computing has indeed become more well-liked as well as successful as a result of improvements inside the way computer as well as telecommunication innovations in recent years. For corporate customers, cloud technology provides benefits as well as chances to move as well as take benefit of the flexibility of something like the pay-as-one-go pricing structure. Increasing adoption of internet implementations and solutions has become crucial due to safety as well as confidentiality issues raised by exporting data as well as commercial operations to the internet or a related party. To address the current vulnerability issues, scientists and concerned enterprises have suggested several protection strategies throughout the field. The research additionally offers a thorough analysis of the concerns about confidentiality with cloud technology. However, current solutions offered in the research do n't have enough adaptability to mitigate a variety of attacks while compromising clouds safety goals. Contemporary research has also concentrated on identifying confidentiality as well as safety concerns while offering sufficient technological solutions to address these problems. Research which suggests technological remedies for safety problems, on the other hand, typically fallen short in describing how these such dangers came to be. The purpose of this work is to highlight safety as well as confidentiality concerns which call for an adaptable treatment method without compromising current or prospective cloud infrastructure. The above study evaluates many studies throughout the research, considering potential adaptability in defending versus potential recurring attacks, including demonstrating why clouds cybersecurity have rendered several suggested approaches obsolete. In this article, the authors discuss the security threats, encounters and solutions in cloud computing.

Article Details