Skip to main navigation Skip to search Skip to main content

Survey on data security in cloud environment

  • T. Sujithra
  • , M. Sumathi
  • , M. Ramakrishnan
  • , S. M.Udhaya Sankar

Research output: Contribution to journalArticlepeer-review

Abstract

Cloud provides high quality computing services, also it's provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its widespread usage is reduced due to its security issues. In cloud computing environment data will be stored in the servers which are situate at various locations can be accessible by illegal parties may leads to different security problems. Different methods have been developed to overcome the security issues in cloud environment such as signcryption, which is a valuable cryptography skill, which can afford concurrently both the roles of encryption following signature in a reason step. Likewise, different method methods have been planned to overcome the security issues in cloud environment. This survey details the threats and security anxieties in cloud computing along with the Classification of Security in cloud environment. Also, the review grants the current explanations obtainable in the works to counter the security issues. Likewise, the comparison table has been presented for those methods; result has been analyzed and finally ends up with the conclusion.

Original languageEnglish
Pages (from-to)155-166
Number of pages12
JournalInternational Journal of Advanced Research in Engineering and Technology
Volume11
Issue number4
DOIs
Publication statusPublished - 04-2020

All Science Journal Classification (ASJC) codes

  • Biotechnology
  • Environmental Engineering
  • General Chemical Engineering
  • Geotechnical Engineering and Engineering Geology
  • General Engineering
  • Information Systems and Management
  • Management of Technology and Innovation

Fingerprint

Dive into the research topics of 'Survey on data security in cloud environment'. Together they form a unique fingerprint.

Cite this