A Detailed Survey Of The Security Issues And Defensive Tactic In Cloud Background
Main Article Content
Abstract
Cloud computing technology is a stretchy, price- efficient and provides a nice stand for the trade opportunities and the customer services via network. It is the main route to improve the capacity or else add the capability with dynamism without investing in new infrastructure. From the past few years cloud computing technology was the fastest growing segment in the IT filed. Extreme plenty of information has been stored in the cloud because of its convenience. In the face of of the public relations neighboring in the cloud the consumers are unwilling towards make a proposal for their business in the cloud. The growth of the cloud was deduced by the security issues in the cloud. The complications in the data privacy and the protection of the data will extending due to the clumpness in the market . The cloud architecture have several threatening issues the cloud service users need to be aware of the issues and the existing protective techniques. Hence in this paper a survey was held depends upon the different security issues belongs to the cloud and also its defensive methodology. There are several other existing methodologies are there which can improving the features in the cloud and also reduces the risk in the cloud. This survey was more specific to different safety problems also defensive mechanism in cloud computing.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.