Security Issues with Cloud Computing

Authors

  • Trimuke Digambar Senior Scale Lecturer, Department of Computer science and Engineering, Government Women's Polytechnic Kalaburagi, India.

Keywords:

Security Issues, Cloud Security, Cloud Architecture, Data Protection, Cloud Platform, Data Security, virtual memory

Abstract

The term "cloud computing" refers to an approach to IT that allows users to access shared resources including networks, storage, servers, applications, and services over the internet on an as-needed basis and pay for what they use. Therefore, it helps firms save time and money on controlling costs. Banking, healthcare, and education are just a few of the many industries making the switch to cloud computing. This is mostly due to the cost-effectiveness of the services offered by the cloud, which are based on a pay-per-use model that takes into account resources and transactions. In cloud computing, clients' data is kept and maintained in the data center of a cloud provider, such as Google, Amazon, Salesforce.com, Microsoft, etc., and the technology relies entirely on the internet. A number of security risks and challenges, including as data leakage, insecure interfaces, resource sharing, data availability, and insider assaults, may arise from a lack of control over the data. A number of research obstacles exist when it comes to cloud computing adoption, including privacy, interoperability, and reliability, as well as well-managed service level agreements (SLAs). Cloud computing, its architecture, the many cloud models, and the primary security threats and challenges in the cloud computing industry are all defined and discussed in this research study. Included in this study is a discussion of best practices for service providers and businesses looking to use cloud computing to boost their bottom line amid the current economic downturn.

Published

21-08-2022

How to Cite

Trimuke Digambar. (2022). Security Issues with Cloud Computing. Journal of Scientific Research and Technology, 3(1), 1–6. Retrieved from https://jsrtjournal.com/index.php/JSRT/article/view/181

Issue

Section

Articles