Identity and Access Management in the Cloud
Subash Banala
Vol 10, Special Issue 2024
Page Number: 60 - 69
Abstract:
Cloud security includes controls and process enhancements to deter potential attackers and identify problems as soon as they appear. Data backup measures should be considered in cloud security in an emergency or security incident. A multitude of cloud security options employ various methodologies to cater to private, public, and hybrid clouds. Customers are in charge of protecting their own assets, including data, apps, and virtual machines; cloud providers handle hardware and software security. Public cloud systems use this shared responsibility notion.
Even though the cloud offers many benefits and services, there are specific issues with safe data access and storage. Cloud security raises numerous problems, such as seller lock-in, multi-tenancy, carrier disruption, data loss, and loss of control. This study examines the primary issues with clouds and potential solutions. It also discusses several ways to protect data in the cloud through encryption techniques, authentication, and other measures and has identified data loss as a major risk.
References
- Armstrong Nhlabatsi, Threat -Specific Security Risk Evaluation in the Cloud, iee transactions on cloud computing, VOL. 9, NO. 2, april-june-2021
- A. Jyothsna, A survey on efficient security algorithm in cloud computing, December 2016 International Journal of Pharmacy and Technology.
- Rajani Sajjan, Vijay dhonge, Multi-factor Authentication as a Service for Cloud Data Security, June 2016 Conference: International Journal of Computer Sciences and Engineering Volume: 4.
- Naresh vurukonda1, B.Thirumala Rao, A Study on Data Storage Security Issues in Cloud Computing,2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016)
- Dr.K.Rama Krishna Reddy, Data Masking Techniques in Cloud Computing, International Journal of Scientific Research and Review,2018.
- Wayne J. Brown, Vince Anderson, QingTan, Multitenancy-Security Risks and Countermeasure,15th International Conference on Network-Based Information Systems.
- Ahmed Albugmi, Madini O. Alasaffi, Data Security in Cloud Computing, fifth international conference on future generation communication technologies.
- Rohit bhadauria, sugata Sanyal, A Survey on Security issues in Cloud computing, International Journal of Computer Applications • April 2012
- R.Barona, E.A. Mary Anita, A Survey on Data Breach Challenges in Cloud Computing Security: Issues and Threats,2017 International Conference on circuits Power and Computing Technologies
- GUOWEI QIU, YINGLIANG ZHAO Article Linear Regression on Distributed Data by Homomorphic Encrypt ion and Data Masking.
- Minghui Xu, Shuo Liu, Dongxiao Yu, Xiuzhen Cheng Cloud Chain :A Cloud Blockchain Using Shared memory consenses with rdma. ieee transactions on computers, VOL. 71, NO. 12, DECEMBER 2022.
- Mrs. Anjali Sharma, Dr. Garima Sinha, An Efficient Approach on Data Security with Cloud Computing Environment: A Comprehensive Research, Vol.12 No.14 (2021), 1372 – 1382
- Praveen Challagidad, Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability, International Journal of Advanced Pervasive and Ubiquitous Computing, Volume 11,Issue 4 ,October-December 2019
- Zina Balani, Cloud Computing Security Challenges and Threats 2020 8th International Symposium on Digital Forensics and Security (ISDFS)
- Jyoti Bolannavar, CSPM, CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment),International Journal of Scientific Research in Computer Science, Engineering and Information Technology.
Back Download