{"title":"A Review: Security Mechanisms in Cloud Computing","authors":"Vikas Kumar","doi":"10.22214/ijraset.2024.63567","DOIUrl":null,"url":null,"abstract":"Abstract: Several administrations, including programming, gathering, and coordinating equipment assets, are included in Cloud Computing (CC) and made available to service users online. The advantages of Cloud Computing are flexibility, competence, and high unwavering quality. Numerous organizations are already exchanging data to the Cloud, and as a result, this data needs to be protected against unauthorized assaults, service rejection, and other threats. Information is deemed secure if classification, accessibility, and uprightness are all available. The challenges and problems related to Cloud Computing security are illustrated in this paper. Additionally, research on security protocols for Cloud-based settings is carried out.","PeriodicalId":13718,"journal":{"name":"International Journal for Research in Applied Science and Engineering Technology","volume":"7 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal for Research in Applied Science and Engineering Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22214/ijraset.2024.63567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract: Several administrations, including programming, gathering, and coordinating equipment assets, are included in Cloud Computing (CC) and made available to service users online. The advantages of Cloud Computing are flexibility, competence, and high unwavering quality. Numerous organizations are already exchanging data to the Cloud, and as a result, this data needs to be protected against unauthorized assaults, service rejection, and other threats. Information is deemed secure if classification, accessibility, and uprightness are all available. The challenges and problems related to Cloud Computing security are illustrated in this paper. Additionally, research on security protocols for Cloud-based settings is carried out.