Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment
Manu Raj Moudgil1, Anil Kumar Lamba2, Priya Gupta3
1Dr.Manu Raj Moudgil, Professor CGC, Technical Campus, Jhanjeri (Panjab) India.
2Dr.Anil Kumar Lamba, Professor, CGC, Technical Campus,Jhanjeri (Panjab) India.
3Er.Priya Gupta, Assistant Professor, ACET, Barnala (Panjab) India.
Manuscript received on April 02, 2020. | Revised Manuscript received on April 21, 2020. | Manuscript published on May 30, 2020. | PP: 871-877 | Volume-9 Issue-1, May 2020. | Retrieval Number: A2186059120/2020©BEIESP | DOI: 10.35940/ijrte.A2186.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing.
Keywords: Secret Key, Service Provider, Ticket, Trusted Service, Encryption.
Scope of the Article: Cloud Computing