INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

(By Aryavart International University, India)

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2015

Impact Factor(2021): 5.246 | Impact Factor(2022): 5.605

ABSTRACT


Identity and Access Management in the Cloud

Subash Banala

Vol 10, Special Issue 2024

Page Number: 060-069

Abstract:

Cloud security includes controls and process enhancements to deter potential attackers and identify problems as soon as they appear. Data backup measures should be considered in cloud security in an emergency or security incident. A multitude of cloud security options employ various methodologies to cater to private, public, and hybrid clouds. Customers are in charge of protecting their own assets, including data, apps, and virtual machines; cloud providers handle hardware and software security. Public cloud systems use this shared responsibility notion. Even though the cloud offers many benefits and services, there are specific issues with safe data access and storage. Cloud security raises numerous problems, such as seller lock-in, multi-tenancy, carrier disruption, data loss, and loss of control. This study examines the primary issues with clouds and potential solutions. It also discusses several ways to protect data in the cloud through encryption techniques, authentication, and other measures and has identified data loss as a major risk.

Back Download