Submit Search
Upload
An Analysis of Cloud Security
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i2/IRJET-V9I226.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
AJASTJournal
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Associate Professor in VSB Coimbatore
Recommended
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
CSCJournals
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
AJASTJournal
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Associate Professor in VSB Coimbatore
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
489 493
489 493
Editor IJARCET
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
IRJET Journal
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to An Analysis of Cloud Security
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
Pradeep Muralidhar
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
489 493
489 493
Editor IJARCET
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
IRJET Journal
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Zac Darcy
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
Zac Darcy
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
cherry686017
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
IRJET Journal
Similar to An Analysis of Cloud Security
(20)
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
How secured and safe is Cloud?
How secured and safe is Cloud?
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
489 493
489 493
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
pipeline in computer architecture design
pipeline in computer architecture design
ssuser87fa0c1
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Recently uploaded
(20)
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Internship report on mechanical engineering
Internship report on mechanical engineering
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
pipeline in computer architecture design
pipeline in computer architecture design
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
An Analysis of Cloud Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 149 An Analysis of Cloud Security Tushar Parmanand Budhwani1, Potlapally Tejaswini2, Ayanesh Chowdhury3, Durga Bhagavan Bolli4, Mohammed Khaja Fahad Uddin5, Hari Hara Chaitanya Kurapati6 ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is used by a number of organizations for storing a large quantity of records on the clouds. Therefore, there can be need to protect the datawhich may additionally furthermore in the shape of text, audio, video, and lots of others. There are several algorithms designed with the aid of using the way of the researchers for securing the facts on the cloud. The present paper via using is a try to point out some of the crucial algorithms for the safety of statistics for this cause, exhaustive literature has been executed. Key Words: Cloud Security, Genetic Algorithm, Data Encryption, Intrusion Detection System, Security Techniques. 1.Introduction The term “Cloud computing” has defined through National Institute of Standards and Technology (NIST) is complete and developing era inside the everyday existence for each one that gives call for internet offerings like networks, storage, servers and programs with flexibility and cost efficient performance for customers. Cloud computing is a generation that boom or lessen the storage functionality as peruse without fundinginnewinfrastructure.Themethodof cloud storage includes 4 layers newly storagelayerthatsave facts on cloud records middle, control layer which ensures privateness and safety of cloud storage,applicationinterface layer that provide cloud application provider platform, and in the end cloud get right of entry to layer which offer accessibility to the cloud man or woman. The cloud fashions are classified with distinct offerings like Infrastructure as a Service (IaaS): is most usual and advanced marketplace segments of cloud that deliver customized infrastructure on name for, Platform as a Service(PaaS): that gives platform and surroundings to the developers that construct cloud offerings and application on the web and that services are saved inside the cloud and accessed by using cloud customers the use of web browser, Software as a Service (SaaS): that gives its own software program going for walks on a cloud infrastructure. The cloud patron need no longer manage or manipulate the cloud infrastructure along with storage, working system, services, network and application. It moreover reduces the want of pc systems, server, storage and control and run all application. In cloud computing facts are growing exponentially but safety of statistics is still questionable. Due to the transfer of statistics to the cloud facts center, the safety trouble takes place and information proprietor loss their manipulate on information. Security and privacy for cloud records is a first rate element of cloud computing this is though now not solved. These cloud safety worrying conditions consist of unauthorized access,records leakage and person‟s sensitive facts leaks. 2. Literature Review Firstly considering the In the twelve months 2011, authors provided a bit related to cloud computing offerings like networks, storage,servers,servicesandapplicationswithout physically receipt them. As in line with observation in the paper it's far observedthatoverheadofthelargemachinehas been decreased of danger, statistics leakage and so on [1]. Cloud computing provide on- call for internet offerings. If a corporation supplying internet offerings need to make investments massive capital cash for infrastructure and issues like system failure, disk failure and software bugs and many others. Because of this cloud is great solution for folks that does no longer want to setup infrastructure in personal device. [2] According to this paper cloud person no want to make investments cash on infrastructure and pay as in keeping with offerings use. In the one year 2012, authorsdiscussed approximatelycloud securitythatfactsdevelopingexponentiallyhoweversafetyof an open- ended and rather easily onhandpropertycontinues to be questionable and investigates risks ofsafetyfromcloud computing surroundings, traits, cloud transport version and the cloud stakeholder [4] . The authorsshortdiscussedabout cloud protection. In in recent timesincreasinglymorehuman beings are the use of clouds whichhavesensitiveinformation and ship, reap and save in community in order that cloud community protection has end up most important troubles [5] in above artwork creator communicatesome Violation of privatefacts, man-in-middle assault, information corruption are risk problems that impact cloud protection. Cloud is one of the most technological research location because of its flexibility and price performance and transformation of data among patron and server. [6] this paper elaborates to make certain the strong statistics safety is managed with the assist of recognition control gadget additionally hold the transaction desk that contains the facts. In cloud, virtualization is important for cloud computing however the safety forvirtualization isn'tproperly studied [7]. Thispaper assessment of cloud protection makes a speciality of how virtualization assaults influences excellent cloud computing issuer model. The cloud computing offers platform for sharing of property that contains software program and infrastructure with the help of virtualization [8]. Which discuss cloud surroundings makes try to be flexible and dependable to offer offerings. Cloud protection provides a few sort of protection patternwhichcloudprovidercompany cloud comply and uses RSA set of regulations with Digital
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 150 Signatureis used to encrypt cloud informationWhilerecords are transferred in network [9] is defined the safety control fashions andprotectionnecessitiesandRSAsetofregulations with Digital Signature to boom cloud facts safety in cloud. Firstly considering In the twelve months 2011, authors provided a bit related to cloud computing offerings like networks, storage, servers, services, and applications without physically receipt them. As in line with observation in the paper, it's far observed that overhead of the large machine has been decreased ofdanger,statisticsleakageand so on [1]. Cloud computing provides on-call internet offerings. If a corporation supplying internet offerings need to make investments massive capital cash for infrastructure and issues like system failure, disk failure andsoftware bugs and many others. Because of this cloud is great solution for folks that does no longer want to setup infrastructure in personal device. [2] According to this paper cloud person no want to make investments cash on infrastructure and payas in keeping with offerings use. In the one year 2012, authorsdiscussedapproximatelycloud security that facts developing exponentially however safety of an open- ended and rather easily on hand property continues to be questionable and investigates risks of safety from cloud computing surroundings, traits, cloud transport version and the cloud stakeholder [4] . The authors short discussed about cloud protection. In in recent times increasingly more human beings are the use of cloudswhich have sensitive information and ship, reap and save in community in order that cloud community protection has end up most important troubles [5] in above art work creator communicate some Violation of private facts, man- in-middle assault, information corruption are risk problems that impact cloud protection. Cloud is one of the most technological research location because of its flexibility and price performance and transformationofdata amongpatron and server. [6] this paper elaborates to make certain the strong statistics safety is managed with the assist of recognition control gadget additionally hold the transaction desk that contains the facts. In cloud, virtualization is important for cloud computing however the safety for virtualization isn't properly studied [7]. This paper assessment of cloud protection makes a speciality of how virtualization assaults influences excellent cloud computing issuer model. The cloud computing offers platform for sharing of property that contains software program and infrastructure with the help of virtualization [8]. Which discuss cloud surroundings makes try to be flexible and dependable to offer offerings. Cloud protection provides a few sort of protection pattern which cloud provider company cloud comply and uses RSA set of regulations with Digital Signature is used to encrypt cloud information While records are transferred in network [9] is defined the safety control fashions and protection necessities and RSA set of regulations with Digital Signature to boom cloud factssafety in cloud. In the 12 months 2013, it is determined that multi-clouds providers to govern safety has secured an awful lot less attention from the studiesnetworkthantheuseofunmarried cloud provider [10] the principle interest of this paper is locate of multi-clouds, lessen safety dangers and facts safety. Cloud consumer‟s motives loss of control from the proprietor‟s aspect due to moving data outward from organizational obstacles and get admission to them via internet. [11] provides quick description approximately records securing and preserve a degree of consider amongst information proprietors is become an essential issues for cloud carriers. The nasty human beings have 2nd option to purpose harm to human beings‟s touchy facts by means of doing cyber attacks in desiretobodilyattacksandtosaveyou the cyber attacks wishes time and sake of securing business, non-public records and nation [12]. In this paper noted assuring cloud records protection, data mining and algorithms contribute specially. In the year 2014, the maximum critical strategies in our existence is Internet of Things (IoT) and cloud computing. Their leased and use is expected to increase further, because of this cause will become maximum required component on net [13] offer interest on integration of IoT and cloud computing, which is added as CloudIoT. Cloud offers virtual pool of sources to the cloud customers as carrier thru an internet interface and Cloud sources include infrastructure, community, platform, software program software, storage and most of the corporation are migratingtheirfactsoverthe cloud, it's far important to ensure safety and integrity of cloud person‟s statistics [14] has speak the safety dangers posed to statistics at the cloud computing. The rapid increment within the vicinity of cloud computing also will increase server security problemsand it'sfardifficulttosong the security threats and one of the most right threats comes in the Diversity of a Denial-of- Service(DOS) and its larger elementisDistributedDenial-of-Service(DDOS)assaultthose are the splendid sorts of network intrusion in cloud computing surroundings [15]arepresentingamannerwhich might be able to clean out and hit upon essentially attacked web page traffic inside a very a lot less term. In the 12 months 2015, determinedthatDistributedDenialof Service Attack is one of the important troubles, it's miles a sort of assault where a group of intruder start attacking in a single goal that allow to keep away fromfromservicesforthe consumer of the focused device [16] defined the various Distributed Denial of offerings assault detection and prevention strategies. Investigation of cloud safety is more tough instead of investigating virtual forensic, many demanding conditions are confronted by way of using investigator in forensic research, to extract evidences from the cloud forensic investigations may additionally end up complex [17] creator provided the complexity of cloud and a manner to impacts digital investigations. Cloud is a shape of
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 151 dispensed computing wherein assets and application are shared over the internet and cloud client can pay on utilization basis [18] the purpose of this paper is to speak about severa unsolved safety risks that affecting the cloud computing and moreover speak the benefits and downsides of present cloud security plans and additionally introduced cloud safety issues which includesrecordssegretation,safety and records integrity. In the 12 months 2016, determined that Internet of things (IoT) defines the entirety, which are connected to Internet with functionality to exchange information over community however the layout and configuration of technology improperly will brought about to safety threats [19] defined the security threats of Internet of things (IoT) after which proposed the protection framework to lessen the safety threats. Cloud computing is dynamic generation, that offers the transformation of information and avoid the weight of nearby storage of cloud users [20] proposed a manner to enhance the safety elementsbywayoftheuseofstenography and cryptographic strategies. Security-as-a- Service(SaaS) model affords protection in cloudenvironmentandclientcan without issues use those services using net browser and set of rules is canny in a way the Encryption into multiple encryption [21] In this paper author worked in encryption and decryption in cloud issuer in highbrow andtranspicuous manner. In the year 2017, authors mentioned about cloud computing platform is implemented and designed to use net applications and proportion by means of net such sort of technology built using OpenStack framework, open to multimodal enhancements and exploiting fingerprints is an precise biometric technique for user authentication, the platform offer comfy get right of entry to for more than one customers ensures and offer complete logical dissociation of information resourcesand computation relatedtoparticular enterprise [25] defined topics relatedtocloudprotection,the safety of data storage on public cloud servers and authentication of logical user having access to the cloud. In cloud, multi-cloud storage is one of the important problem. This is used to saveand get entry to cloud statisticsremotely, and storage are capable of encrypting and hold records in awesome cloud drives [26] proposed model, that offer answer for one-of-a-type insider‟s assault, privateness for one-of-a-kind documents uploaded through brilliant customers,anddecentralizeddistributionofstatisticsstorage the use of an index based cryptographic information. In the year 2018, the cloud safety grow to be largest concern for cloud researchers because of unauthorized sports are growing on in keeping with cloud customers [27] proposed new safety architecture for cloud framework that offer greater facts transformation and defends information from data leakage. Data owners and cloud servers have different identities, this framework offer records storage and feature unique safety troubles, an unbiased technique required to make sure that cloud information is hosted efficiently within the cloud server [28] mentioned one-of-a-kind safety strategies for secure information stored on the cloud. Cloud computing makes use of “Utility Computing” and “Software- as-a-Service” to provide the required provider with the resource of cloud character, cloud protection isanotableand important fact,hasseveralproblemsandtroubleassociatedit [29] Described the list of parameters which is probably affected the protection and discover protection troubles and troubles are faced via the usage of cloud serviceproviderand purchasers like records privacy, protection issues and infected application. 3. METHODS FOR SECURING ROUGH DATA SET A. Genetic Algorithm Genetic Algorithm (GA) is a looking method this is used to discover approximate or specific solution to optimization and seek problem [30] GA convert great domain hassle to a model through the use of chromosome and the set of rules manner begins off evolved with a random choice of the populace of chromosomes. Chromosomesareconvertedinto bits or numbers consistent with the hassle [23]. Natural and successive guidelines are advanced thru Genetic Algorithm that suggestions are used for community site visitors that differentiate amongst everydayorsplendid websitevisitors. Pseudo code of Genetic Algorithm • Select initial populations • Repeat • Find out the person health of a tremendous percent consistent with the population • Choose the excellent rating human beings pair to reproduce • Use crossover and mutation operator • Repeat the device until the termination condition came about 4. K-Mean Algorithm K-propose is an appropriate set of guidelines of partitioning approach for clustering evaluation. Thepurposeofthissetof rules is to reduce an goal function referred to as square mistakes feature.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 152 Where ki shows the number of data points in ith cluster • Find new cluster center by using re-computation of distance between all data points 5. Security Techniques for Securing Cloud Cloud records encryption is not the solutionforstatistics that would keep religion over cloud safety. It may be made thru utilizing gift security strategies like Authentication and identification, encryption, integrity checking, get entry to manipulate, cozy detection, and facts covering are all of the protection strategies are applicable to cloud facts. Figure 2 explains safety strategies. A. Validation of OTP In the cutting-edge scenario, a lot of banks are providing authentication via One Time Password (OTP) approach that is generated thru random beneath technology and used to verify the cloud person someday it is used for one time authentication called as device aspect authentication that is verified in figure three. While sometime it's miles used for 2 time authentication referredtoasasMultipleAuthentication Factor. Figure 3 OTP Authentication B. Integrity Checking The integrity of cloud information is a guarantee that cloud records can only be modified or accessed by way of an authorized user. In easy phrases, it is a cloud-primarily based absolutely facts verificationdeviceguaranteesthatthe information is unmodified, correct and the fundamental techniques of data integrity are Provable Data Prossession (PDP) is a way to make sure the integrity of cloud information on a miles off server and the approach Proof Of Retrievability (POR) to attain and affirm the proofthatcloud statistics is stored thru the individual on the server is not changed [24]. C. Access Control Access manipulate manner cloud facts owner can execute some restrictive permission to get proper of access to their facts outsource to cloud and records proprietor‟s felony patron can get admission to cloud facts at the equal time as unauthorized customer can‟t due to access manipulate cloud statistics are included from amendment or unauthorized disclosure of records. D. Secure Deletion It is crucial to apprehend how the information is deleted from the server. Deletion uses outstanding techniques like Clearing, on this approach we delete the media before the reuse of those media and on the identical time offer safety for accepting the statistics that contained in the media earlier than deleted. Sanitization, proper here the safety for accepting preceding statistics isn'talwaysfurnishedandthis shape of records is often circulated for lower degree of kind [32].
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 153 E. Encryption Cloud safety presents statistics encryption provider to encrypt cloud records earlier than switch from nearby storage to cloud storage and it's miles no longer viable to recognize from any machine, database or report to decrypt records with out decryption key and encrypted statistics is high-quality possible to access with a certified purchaser with the decryption key and separationofencryptedrecords and encryption key's crucial formaintaining cloudrecordsat ease. Figure 4 explains encryption and decryption system given below. Figure 4 Data Encryption and Decryption F. Data Masking Data protecting is a way of securing and hiding cloud facts from attackers and robbery and it moreover insure that the records is changed with realistic but no longer real records. While people interchangeably use phrases together with records de-popularity, statistics cleansing and statistics the time period defining the hard machine. Data overlaying is not most effective set of rules however moreover a public information set. There are superb methods or strategies are used to mask cloud facts, Static Data Masking (SDM) is used by most organizations when growing checks and this is definitely the only method of protecting viable even as the usage of outsourced builders in a separate siteor enterprise. In those cases, it is critical to duplicate the database. Dynamic Data Masking (DDM) provide get right of entry to primarily based on their role within the corporation [3]. G. Intrusion Detection System Intrusion Detection System (IDS) defines as a software program program applications or gadgets that hold eyes on device sports or community site visitors and locate if any illegal sports befell. In the modern-day technology, maximum of the hackers use distinct attacking strategiesfor locating customers touchy records. An intrusion suggests any unlawful get admission to or evil sports forIT resources. The intruders try to find unauthorized get admission to in touchy facts, reasons harmful sports activities. The forms of Intrusion Detection System are defined, Network- Based Intrusion DetectionSystem(NIDS)thatobservedina devices or computer connected section of an corporation‟s community and monitor network website site visitors and hold eyes on ongoing assaults, Host-Based Intrusion Detection System (HIDS) is hooked up on unique system or server and display unlawful activities on that device. 6. CONCLUSION In the above presentation, it's far positioned that there is a large scope for the technology of new safety algorithms for securing the statistics set. The importance of every method has been provided in quick however, the ones can be implemented forsecuringthecloudrecordswithintheabove in which exhaustive literature has been consulted and explained in quick. REFERENCES 1. R. Choubey, R. Dubey, and J. Bhattacharjee, “A survey on cloud computing security, challengesand threats,” Int. J. Comput. Sci. Eng., vol. 3, no. 3, pp. 1227–1231, 2011. 2. R. P. Padhy, M. R. Patra, and S. C. Satapathy, “X-as-a- Service: Cloud Computing with Google App Engine, Amazon Web Services, Microsoft Azure and Force.com,” Int. J. Comput. Sci. Telecommun., vol. 2, no. 9, pp. 8–16, 2011. 3. G.K. Ravikumar “Design of Data Masking Architecture and Analysis of Data Masking Techniques for Testing”, International journal of engineering science and Technology, vol. 3, no. 6, pp. 5150-5159, 2011. 4. A. Behl, K. Behl, “An Analysis of Cloud Computing security issues,” 2012 World Congr. Inf. Commun. Technol., pp. 109– 114, 2012. 5. D Chopra, D Khurana, K Govinda, “CLOUD COMPUTING SECURITY CHALLENGES AND SOLUTION,” International Journal of Advances in Engineering Research, vol. 3, no. 2, 2012. 6. G. R. Vijay, “An Efficient Security Model in Cloud Computing based on Soft computing Techniques,” vol. 60, no. 14, pp. 18–23, 2012. 7. H. Tsai, N. Chiao, R. Steinmetz, and T. U. Darmstadt, “Threat as a Service?: Virtualization's Impact on Cloud Security,” no. February, pp. 32–37, 2012. 8. K. Kumar, V. Rao, S. Rao, and G.S. Rao, “Cloud Computing : An Analysis ofItsChallenges&Security Issues,” IJCSN,vol. 1, no. 5, 2012. 9. K. D. Kadam, S. K. Gajre, and R. L. Paikrao, “Security Issues in Cloud Computing,” Proceedings published by International Journal of Computer Applications,pp. 22–26, 2012.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 154 10. M. Shrawankar, A. Kr. Shrivastava “Comparative Study of Security Mechanisms in Multi- cloud Environment,” vol. 77, no. 6, pp. 9–13, 2013. 11. N. Aggarwal, P. Tyagi, B. P. Dubey, and E. S. Pilli, “Cloud Computing : Data Storage Security Analysis and its Challenges,” vol. 70, no. 24, pp. 33–37, 2013. 12. P. Aggarwal, M. M. Chaturvedi, “Application of Data Mining Techniques for Information Security in a Cloud: A Survey,” Int. J. Comput. Appl., vol. 80, no. 13, pp. 11–17, 2013. 13. A. Botta, W. De Donato, V. Persico, and A. Pescape, “On the integration of cloud computingandinternet of things,” Proc. - 2014 Int. Conf. Futur. Internet Things Cloud, FiCloud 2014, pp. 23–30, 2014. 14. D. Panth, D. Mehta, R. Shelgaonkar “A Survey on Security Mechanisms of Leading Cloud Service Providers,” Int. J. Comput. Appl. , vol. 98, no. 1, pp. 24–34, 2014. 15. D. Porwal, P. Mohmood Khan and D. Shankar Ray, “Cloud Computing Security Threats and Countermeasures”, International journal for innovations in Engineering Science and Management, vol. 2, no. 4, pp. 1-4, 2014. 16. D. Parwani, A. Dutta, P. Kumar Shulka, and M. Tahilyani, “Various Techniques of DDoS Attacks Detection and Prevention at Cloud: A Survey,” Orient. J. Comput. Sci. Technol., vol.8,no.2,pp.110– 120, 2015. 17. G. Al, “Cloud Computing Architecture and Forensic Investigation Challenges,” Int. J. Comput. Appl., vol. 124, no. 7, pp. 20–25, 2015. 18. M. U. Shankarwar and A. V. Pawar, “Security and Privacy in Cloud Computing: A Survey,” Adv. Intell. Syst. Comput., vol. 328, pp. 1–11, 2015. 19. A. F. A. Rahman, M. Daud, and M. Z. Mohamad, “Securing Sensor to Cloud EcosystemusingInternet of Things (IoT) Security Framework,” Proc. Int. Conf. Internet things Cloud Comput. - ICC ’16, pp.1– 5, 2016. 20. B. Pathankot, “Review Paper on Enhancing Data Security for Cloud Environment Cryptography and Steganography,” International Journal of Engineering Applied Sciences and Technology, vol. 2, no. 1, pp. 44–48, 2016. 21. D. H. Sharma, C. A. Dhote, and M. M. Potey, “Intelligent Transparent Encryption-Decryption as Security-as-a-Service from clouds,” 2016 Int. Conf. Comput. Syst. Inf. Technol. Sustain. Solut. CSITSS 2016, pp. 359–362, 2016. 22. B. Mahesh, “Data Security and security controls in cloud computing”, International journal ofadvances in Electronics and Computer Sciecne, pp. 11-13, 2016. 23. T. Singh, S. Verma, V. Kulshrestha and S. Katiyar, “intrusion Detection System Using Genetic Algorithm for Cloud”,International journal of Advances in Electronics and Computer Science, pp. 1-6, 2016 24. S. Sharma, “Data Integrity Challenges in Cloud Computing”, 4th international conferenceonrecent innovations in science engineering and management, pp. 736-7436, 2016. 25. G. L. Masala, P Ruiu, E Grosso, “Biometric Authentication and Data Security in Cloud Computing,” Comput. Netw. Secur. Essentials, pp. 337–353, 2017. 26. K. Subramanian and F. L. John, “Secure and Reliable Unstructured Data Sharing in Multi-Cloud Storage using the Hybrid Crypto System,”IJCSNS,vol. 17,no. 6, pp. 196–206, 2017. 27. A. Hussain, C. Xu, and M. Ali, “Security of Cloud Storage System using Various Cryptographic Techniques,” International Journal of Mathematics Trends and Technology ( IJMTT ), vol. 60, no. 1, pp. 45–51, 2018. 28. A. Venkatesh and M. S. Eastaff, “A Study of Data Storage Security Issues in Cloud Computing,” IJSRCSEIT, vol. 3, no. 1, pp. 1741–1745, 2018. 29. G. Jain and A. Jaiswal, “Security Issues and their Solution in Cloud Computing”, Concepts journal of applied research(CJAR), vol. 02,no. 03, pp. 1-6, 2018. 30. Y. Guo and B.Wang et.al., “Feature Selection Based on Rough Set and Modified Genetic Algorithm for intrusion Detection” , The 5th International conference on Computer science & EducationHefei, China, pp. 1441-1446, 2018. 31. Data clustering algorithms[online] https://sites.google.com/site/dataclusteringalgorit hms/k- means-clustering-algorithm (Accessed 08 March 2019).
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 155 32. CloudCodes[online] https://www.cloudcodes.com/blog/ data- protection-controls-techniques.html (Accessed 20 December 2019). 33. DIGITAL GUARDIAN [online] https://digitalguardian.com/blog/what-cloud- encryption (Accessed 25 December 2019).
Download now