International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016


A Review on Security Concerns in Cloud Computing

Sharanjeet Kaur [2] | Ramandeep Singh [6]


Abstract: The cloud computing is the technique which provides services to various users for data storage on virtual servers. In the architecture of cloud computing, it has cloud server, virtual machines, third party and virtual servers. The user can access cloud services through cloud service provider but before that user have to authenticate with the virtual machine. The user information like user credentials can be stored on the third party. The second major role of virtual machine is to provide data security to the user data. This paper mainly focuses on security concerns of cloud computing like authentication, access control, data confidentiality, integrity and availability.


Keywords: Authentication, Access control, Data confidentiality, Data integrity and Data availability


Edition: Volume 5 Issue 3, March 2016,


Pages: 871 - 874


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sharanjeet Kaur, Ramandeep Singh, "A Review on Security Concerns in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 871-874, https://www.ijsr.net/get_abstract.php?paper_id=NOV161993

Similar Articles with Keyword 'Authentication'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top