SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1314
Secure Cloud Computing
Harshada Shrikant Desai1, Arati Sunil Kasurde2, Dr.S.P. Jadhav3, Asst.prof.S.S. Jadhav4
1stHarshada Shrikant Desai, MCA YTC, Satara
2ndArati Sunil Kasurde, MCA YTC Satara
3rd Dr.S.P. Jadhav,4 Prof.S.S. Jadhav Dept. of MCA Yashoda Technical Campus, Satara-415003
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT- It is nothing but way to deliver computing
source inCloud Computing. It ranges from data storage
and processing to software i.e., customer relationship
management systems, which is available instantly and
in demand.
Manipulation, configurationandaccessingisreferedby
Cloud Computing h/w & s/w source monitor. Online
data storage, infrastructure and application is offered
by it. In this research paper the researcher has
discussed about the introduction part of the cloud
computing, types of cloud computing. A research has
also focus on Benefits limitation and future working of
the cloud computing. In overall conceptual are
discussion of cloud computing with the research has
also focuses in future development.
1. INTRODUCTION
A social media is the depending with the cloud
computing. cloud computing isimple line meaning is
transport of the computing with the service.
Types of Cloud Computing are as follows:
 Infrastructure as a service (IaaS)
 Platform as a service (PaaS)
 Software as a service (SaaS)
Cloud computing can interacts with networksit’s rules
and regulations which is joined to its role. So, to start
with the, we have already listenthe asset of knowingto
code for cloud computing.
1.1. What are Cloud Computing Security?
Collection of security measures are designed to
securecloud-basedinfrastructure,dataandapplication.
The other name of Cloud Computing security is
collectionofsecuritymeasures. The abovewaysassure
user anddevice verification. In today’s era there is high
demand to work in Cloud Computing field.
1.1. Use of Cloud Computing:
CC allows to the access file, resources, data, files
whenever we are not connected to network the cloud
computingis allows to access to their networkwith the
help of internet.
1.2. Types of cloud Computing:
Commonly using the cloud computing use cases:
 IaaS
 PaaS
 SaaS
1] IaaS: IaaS is nothing but the h/w as a service. the
access are in many clients and source internet used
with online paying System. Iaas is using three types of
the cloud first is the public second is private and third
one is hybrid cloud. The cloud computing is used for
helps to changing clients in the requirements and
services.
2] PaaS: it is the purchase online mode for available
in this platform. This platform as a service in cloud
service provider. this is the developing the developer
platform application. there are many languages is
available in this like a java, php, perl and so on.
3]SaaS: this application stands for software as a
service. This application is also known as the
requirement for software. and also, customer with
relationship is the management system making a
electronic devices.
2. 7 CASES IN CLOUD COMPUTING:
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Hybrid cloud and multi cloud
5. Test and development
6. Reach Robotics
7. Big data analytics.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1315
3. APPLICATION IN CLOUD COMPUTING AND
DIIFERENT SECTORS:
i] Online data Storage:
The cloud computing is nothing but the accessing the
various source file huge amount of data and files from
with help of online data storage system.
Childrenloveinteractingwithinternethandlingwith
them, and people are seeing excellent results in
happiness and communication skills for children a
n
d
students learning difficulties with the help of is videos
and audios from devices.
ii] Backup and recovery:
The cloudcomputingis example of the databackupand
restorage recover data in system with help of cloud
computing.
For e.g.: WhatsApp, Instagram and so on likewise
iii] big data analysis: -
Most important part of application in cloud
computing in network the huge amount of data or big
data can be impossible to save or store in the system
with help of cloud computing we can easily save our
data in cloud computing.
iv] Testing and Development: -
The cloud computing is provided for easy and time
consuming for the resources and also this is used in
businesses and flexible services of business.
v] Antivirus Application: -
antivirus application is nothing but the monitoring to
system virus and antivirus system such like as the
malware,detectsthesecuritythreatsinthenetworking.
vi] E-commerce Application: -
e-commerce is the new technology to response quick
opportunities to connecting with the e-commerce
system.
vi] Cloud computing in Education:-
the cloud computing is the best way to learning
virtuallysourceforthestudent.Therearemanysources
to learn educational things from various cloud
computing platforms
Example: Children making android application to
learn from the virtual applications like as zoom
meeting, Vedantu app etc.
4. ADVANTAGES OF CLOUD COMPUTING
 Backup and restore data
 improve collaboration.
 Excellent Accessibility.
 Low maintenance cost
 Mobility
 Iservices in the paper use module
 Unlimited storage capacity.
 Data security
5. DISADVANTAGES OF SOCIAL CLOUD
COMPUTING:
 internet connectivity.
 vendor lock-in
 limited control.
 security.
6. IMPORTANCE AND NEEDS OF CLOUD
COMPUTING: -
 Cloud computing are enables with users to
access system using a web browser regardless
of location or what device they used for
example: computer android mobiles are access
via network. User can connect to the network
from anywhere and any place.
Cloud computing is a based service that can
be meet in demand instantly.
7. IMPACTS OF CLOUD COMPUTING IN EVERYDAY
LIFE:
i]Positive Impacts:
 the cloud computing is the changing our
lives in manywaysfromsocialmediashopping,
streaming services and storing the files
 Positive impact in everyday life such as
banking, email, media etc.
 It is committed for the described with directly
to the technology.
 Cloudservicesalsobeingwithuseofsupportis
nothing but the impact.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1316
ii] Negative Impacts:
 i] Humans are depend on the fully socially in
cloud computing and that case many loss faces
in life.
 ii] Safe data is unsecure in the cloud computing
platform. For example: Instagram, WhatsApp
 iii] Cloud like is the anyother IT setup there are
many problems and experience of technical
with the problems faces. that can directly
impact on damaging business e.g., reboots,
network, downtime.
8. FUTURE CHALLENGES:
CC is mainly used and has become for popular latest
in market. The cloud computing is nothing but the
circulate on premises in computing to the internet.
i]security:there are the bestconcernininvolvingcloud
computing service with the security.
ii]password security: many peoples access your
account by vulnerable method, more important about
your password security.
iii] cost management: cloud computing access in
application to save or manage in your post and makes
affordable.
iv]lackof expertise: lackof increasingthe workload for
the cloud technology increasing continuously
improving their tools in technologies.
V] internet connectivity: the internet connectivity is
part of cloud computing. the cloud services are depend
on the internet connectivity, there are many network
issues.
9. CONCLUSION:
Security is a big problem in CC. This needs to be
overcome before services can be widelyadopted.Some
aspects of security are rarely in the field of technology,
with external solutions, such as laws, regulations in
human resource management and the like, it is
importanttofindtechnologicalsolutionstoproblems.It
offerseffectiveisolationbetweendifferentclientswhile
allowing resource sharing. Users can specify and
manage their personal security and QoS policy settings
just as they would traditional on-site management
10.REFERENCES
[1] Global Environment for Network Innovations.
http://www.geni.net, 2006.
[2] M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A.
Shaikh, and J. van der Merwe, Design and
Implementation of a Routing Control Platform. In
Networked Systems Design and Implementation, 2005.
[3] M. Armbrust et al, Above the Clouds: A Berkeley
View of Cloud Computing.
http://www.eecs.berkeley.edu, 2009.
[4] Dark Reading, Security is chief obstacle to cloud
computing adoption, study says,
http://www.darkreading.com.
[5] Network World, are security issues delaying
adoption of cloud computing?
http://www.networkworld.com.
[6] D. A. Joseph, A. Tawakoni, and I. Stoica, A Policy-
aware Switching Layer for Data Centers. In ACM
SIGCOMM, 2008.
[7] T. Lakshman, T. Nandagopal, R. Ramjee, K. Sabnani,
and T. Woo, The SoftRouter Architecture. In ACM
HOTNETS, 2004.
[8] N. McKeown, T. Anderson, H. Balakrishnan, G.
Parulkar, L. Peterson, J. Rexford, S. Shenker, and J.
Turner, Openflow: Enabling innovation in campus
networks. http://www.openflowswitch.org, 2008.
[9] Juniper Networks, Logical Router Overview.
http://www.juniper.net.
[10] The Invisible Things Lab’s blog,
http://theinvisiblethings.blogspot.com.
[11] Z. Wang, and X. Jiang, HyperSafe, a Lightweight

More Related Content

Similar to Secure Cloud Computing

IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing ReviewIRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing ApplicationIRJET Journal
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud SecurityIRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingIRJET Journal
 
A Review Paper On Cloud Computing
A Review Paper On Cloud ComputingA Review Paper On Cloud Computing
A Review Paper On Cloud ComputingGina Rizzo
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
 

Similar to Secure Cloud Computing (20)

IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
An Analysis of Cloud Security
An Analysis of Cloud SecurityAn Analysis of Cloud Security
An Analysis of Cloud Security
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
A Brief Introduction to Cloud Computing
A Brief Introduction to Cloud ComputingA Brief Introduction to Cloud Computing
A Brief Introduction to Cloud Computing
 
A Review Paper On Cloud Computing
A Review Paper On Cloud ComputingA Review Paper On Cloud Computing
A Review Paper On Cloud Computing
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 
70 74
70 7470 74
70 74
 
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
 
Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...Latest development of cloud computing technology, characteristics, challenge,...
Latest development of cloud computing technology, characteristics, challenge,...
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Recently uploaded (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Secure Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1314 Secure Cloud Computing Harshada Shrikant Desai1, Arati Sunil Kasurde2, Dr.S.P. Jadhav3, Asst.prof.S.S. Jadhav4 1stHarshada Shrikant Desai, MCA YTC, Satara 2ndArati Sunil Kasurde, MCA YTC Satara 3rd Dr.S.P. Jadhav,4 Prof.S.S. Jadhav Dept. of MCA Yashoda Technical Campus, Satara-415003 ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT- It is nothing but way to deliver computing source inCloud Computing. It ranges from data storage and processing to software i.e., customer relationship management systems, which is available instantly and in demand. Manipulation, configurationandaccessingisreferedby Cloud Computing h/w & s/w source monitor. Online data storage, infrastructure and application is offered by it. In this research paper the researcher has discussed about the introduction part of the cloud computing, types of cloud computing. A research has also focus on Benefits limitation and future working of the cloud computing. In overall conceptual are discussion of cloud computing with the research has also focuses in future development. 1. INTRODUCTION A social media is the depending with the cloud computing. cloud computing isimple line meaning is transport of the computing with the service. Types of Cloud Computing are as follows:  Infrastructure as a service (IaaS)  Platform as a service (PaaS)  Software as a service (SaaS) Cloud computing can interacts with networksit’s rules and regulations which is joined to its role. So, to start with the, we have already listenthe asset of knowingto code for cloud computing. 1.1. What are Cloud Computing Security? Collection of security measures are designed to securecloud-basedinfrastructure,dataandapplication. The other name of Cloud Computing security is collectionofsecuritymeasures. The abovewaysassure user anddevice verification. In today’s era there is high demand to work in Cloud Computing field. 1.1. Use of Cloud Computing: CC allows to the access file, resources, data, files whenever we are not connected to network the cloud computingis allows to access to their networkwith the help of internet. 1.2. Types of cloud Computing: Commonly using the cloud computing use cases:  IaaS  PaaS  SaaS 1] IaaS: IaaS is nothing but the h/w as a service. the access are in many clients and source internet used with online paying System. Iaas is using three types of the cloud first is the public second is private and third one is hybrid cloud. The cloud computing is used for helps to changing clients in the requirements and services. 2] PaaS: it is the purchase online mode for available in this platform. This platform as a service in cloud service provider. this is the developing the developer platform application. there are many languages is available in this like a java, php, perl and so on. 3]SaaS: this application stands for software as a service. This application is also known as the requirement for software. and also, customer with relationship is the management system making a electronic devices. 2. 7 CASES IN CLOUD COMPUTING: 1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (SaaS) 4. Hybrid cloud and multi cloud 5. Test and development 6. Reach Robotics 7. Big data analytics.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1315 3. APPLICATION IN CLOUD COMPUTING AND DIIFERENT SECTORS: i] Online data Storage: The cloud computing is nothing but the accessing the various source file huge amount of data and files from with help of online data storage system. Childrenloveinteractingwithinternethandlingwith them, and people are seeing excellent results in happiness and communication skills for children a n d students learning difficulties with the help of is videos and audios from devices. ii] Backup and recovery: The cloudcomputingis example of the databackupand restorage recover data in system with help of cloud computing. For e.g.: WhatsApp, Instagram and so on likewise iii] big data analysis: - Most important part of application in cloud computing in network the huge amount of data or big data can be impossible to save or store in the system with help of cloud computing we can easily save our data in cloud computing. iv] Testing and Development: - The cloud computing is provided for easy and time consuming for the resources and also this is used in businesses and flexible services of business. v] Antivirus Application: - antivirus application is nothing but the monitoring to system virus and antivirus system such like as the malware,detectsthesecuritythreatsinthenetworking. vi] E-commerce Application: - e-commerce is the new technology to response quick opportunities to connecting with the e-commerce system. vi] Cloud computing in Education:- the cloud computing is the best way to learning virtuallysourceforthestudent.Therearemanysources to learn educational things from various cloud computing platforms Example: Children making android application to learn from the virtual applications like as zoom meeting, Vedantu app etc. 4. ADVANTAGES OF CLOUD COMPUTING  Backup and restore data  improve collaboration.  Excellent Accessibility.  Low maintenance cost  Mobility  Iservices in the paper use module  Unlimited storage capacity.  Data security 5. DISADVANTAGES OF SOCIAL CLOUD COMPUTING:  internet connectivity.  vendor lock-in  limited control.  security. 6. IMPORTANCE AND NEEDS OF CLOUD COMPUTING: -  Cloud computing are enables with users to access system using a web browser regardless of location or what device they used for example: computer android mobiles are access via network. User can connect to the network from anywhere and any place. Cloud computing is a based service that can be meet in demand instantly. 7. IMPACTS OF CLOUD COMPUTING IN EVERYDAY LIFE: i]Positive Impacts:  the cloud computing is the changing our lives in manywaysfromsocialmediashopping, streaming services and storing the files  Positive impact in everyday life such as banking, email, media etc.  It is committed for the described with directly to the technology.  Cloudservicesalsobeingwithuseofsupportis nothing but the impact.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1316 ii] Negative Impacts:  i] Humans are depend on the fully socially in cloud computing and that case many loss faces in life.  ii] Safe data is unsecure in the cloud computing platform. For example: Instagram, WhatsApp  iii] Cloud like is the anyother IT setup there are many problems and experience of technical with the problems faces. that can directly impact on damaging business e.g., reboots, network, downtime. 8. FUTURE CHALLENGES: CC is mainly used and has become for popular latest in market. The cloud computing is nothing but the circulate on premises in computing to the internet. i]security:there are the bestconcernininvolvingcloud computing service with the security. ii]password security: many peoples access your account by vulnerable method, more important about your password security. iii] cost management: cloud computing access in application to save or manage in your post and makes affordable. iv]lackof expertise: lackof increasingthe workload for the cloud technology increasing continuously improving their tools in technologies. V] internet connectivity: the internet connectivity is part of cloud computing. the cloud services are depend on the internet connectivity, there are many network issues. 9. CONCLUSION: Security is a big problem in CC. This needs to be overcome before services can be widelyadopted.Some aspects of security are rarely in the field of technology, with external solutions, such as laws, regulations in human resource management and the like, it is importanttofindtechnologicalsolutionstoproblems.It offerseffectiveisolationbetweendifferentclientswhile allowing resource sharing. Users can specify and manage their personal security and QoS policy settings just as they would traditional on-site management 10.REFERENCES [1] Global Environment for Network Innovations. http://www.geni.net, 2006. [2] M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe, Design and Implementation of a Routing Control Platform. In Networked Systems Design and Implementation, 2005. [3] M. Armbrust et al, Above the Clouds: A Berkeley View of Cloud Computing. http://www.eecs.berkeley.edu, 2009. [4] Dark Reading, Security is chief obstacle to cloud computing adoption, study says, http://www.darkreading.com. [5] Network World, are security issues delaying adoption of cloud computing? http://www.networkworld.com. [6] D. A. Joseph, A. Tawakoni, and I. Stoica, A Policy- aware Switching Layer for Data Centers. In ACM SIGCOMM, 2008. [7] T. Lakshman, T. Nandagopal, R. Ramjee, K. Sabnani, and T. Woo, The SoftRouter Architecture. In ACM HOTNETS, 2004. [8] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, Openflow: Enabling innovation in campus networks. http://www.openflowswitch.org, 2008. [9] Juniper Networks, Logical Router Overview. http://www.juniper.net. [10] The Invisible Things Lab’s blog, http://theinvisiblethings.blogspot.com. [11] Z. Wang, and X. Jiang, HyperSafe, a Lightweight