Volume- 9
Issue- 2
Year- 2021
DOI: 10.21276/ijircst.2021.9.2.4 | DOI URL: https://doi.org/10.21276/ijircst.2021.9.2.4 Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Surendranath Singh B.G. , Dr. Sunil Phulre
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. Many researchers are working continuously to resolve the issues by introducing policies, algorithms for accessing and storage of client data. This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. Tenant-based measures were also in the solutions to various issues. Paper has listed some of the trust techniques developed by researchers for identifying any malicious machine.
Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India (surendranathsingh.bg@gmail.com)
No. of Downloads: 53 | No. of Views: 1379
Dayanand, Wilson Jeberson, Klinsega Jeberson.
March 2024 - Vol 12, Issue 2
Shalini Shekhar, Dr. Nikita Thakur.
January 2024 - Vol 12, Issue 1
Zahra Jabeen, Khushboo Mishra, Binay Kumar Mishra.
January 2024 - Vol 12, Issue 1