A Review on Security Concerns in Cloud Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133 | Views: 316

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016 | Popularity: 6.3 / 10


     

A Review on Security Concerns in Cloud Computing

Sharanjeet Kaur, Ramandeep Singh


Abstract: The cloud computing is the technique which provides services to various users for data storage on virtual servers. In the architecture of cloud computing, it has cloud server, virtual machines, third party and virtual servers. The user can access cloud services through cloud service provider but before that user have to authenticate with the virtual machine. The user information like user credentials can be stored on the third party. The second major role of virtual machine is to provide data security to the user data. This paper mainly focuses on security concerns of cloud computing like authentication, access control, data confidentiality, integrity and availability.


Keywords: Authentication, Access control, Data confidentiality, Data integrity and Data availability


Edition: Volume 5 Issue 3, March 2016


Pages: 871 - 874


DOI: https://www.doi.org/10.21275/NOV161993



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Sharanjeet Kaur, Ramandeep Singh, "A Review on Security Concerns in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 871-874, https://www.ijsr.net/getabstract.php?paperid=NOV161993, DOI: https://www.doi.org/10.21275/NOV161993

Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top