International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 129

Research Paper | Computer Science & Engineering | United States of America | Volume 9 Issue 5, May 2020


Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani


Abstract: After the invention of cloud computing technology, the concept of building computer system with unlimited resources becomes more simplified. With cloud computing, business owners, can manage and share their information through business organization from anywheretwenty-four hours a day. Organization and business area which are using cloud services must be aware of their information policy, involving data privacy, reliability and security. Building cloud computing system will exposetheir information that are accessed by authorized people to hazard if they did not buildstrong secure system to increase their security level and protect it by authorizing only people who need to access them. The goal of this research paper is to give short vision of cloud computing concept by identifying their different types and discuss cloud security main issues to attract both users and business owner attention to the potential risks of sharing their important data through cloud system without knowing security limitations for each model and secure their system by overcome potential threats for their cloud system.


Keywords: Attacks, Cloud Security, Cloud Attacks, Cloud Privacy, Security and Privacy in Cloud, Security Analysis on Cloud, Cloud Deployment Models, Cloud Characteristics, Data Privacy


Edition: Volume 9 Issue 5, May 2020,


Pages: 1472 - 1477


How to Cite this Article?

Amal Matrouk Aljohani, "Cloud Computing Security Issues and their Data Privacy Concerns", International Journal of Science and Research (IJSR), Volume 9 Issue 5, May 2020, pp. 1472-1477, https://www.ijsr.net/get_abstract.php?paper_id=SR20523084823

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Attacks'

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1257 - 1264

Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform

Bhupendra Ram

Share this Article


Top