Authors:
E. Jeslin Renjith
Addresses:
Department of CDOE-MCA, B.S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, Tamil Nadu, India. jeslin.renjith@gmail.com.
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models let users use servers, networks, storage, services, and applications without buying them. Limited data control can result in account service issues, traffic hijacking, insecure APIs, malicious insiders, technology sharing issues, and multi-tenancy data failures. Continuous research and development improve security and user confidence. This paper provides a framework for understanding cloud computing, identifies security dangers and research issues, and emphasizes its relevance in major industries. It also recommends cloud security innovations and assesses worldwide data protection policies to improve data security and reduce risks. Cloud-stored data is vulnerable to programs with security weaknesses, notwithstanding its benefits. If the guest OS’s security is unreliable, virtualization on a hypervisor may expose data to attacks. Additionally, data security vulnerabilities in transit and at rest will be addressed.
Keywords: Data Security; Cloud Computing; Data Protection and Privacy; Risks and Threats; Public Cloud Storage; Cloud Computing Data Security; Stream Cipher.
Received on: 05/01/2024, Revised on: 10/03/2024, Accepted on: 01/05/2024, Published on: 09/06/2024
DOI: 10.69888/FTSCL.2024.000185
FMDB Transactions on Sustainable Computer Letters, 2024 Vol. 2 No. 2, Pages: 111-119