Volume- 9
Issue- 2
Year- 2021
DOI: 10.21276/ijircst.2021.9.2.4 |
DOI URL: https://doi.org/10.21276/ijircst.2021.9.2.4
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Surendranath Singh B.G. , Dr. Sunil Phulre
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. Many researchers are working continuously to resolve the issues by introducing policies, algorithms for accessing and storage of client data. This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. Tenant-based measures were also in the solutions to various issues. Paper has listed some of the trust techniques developed by researchers for identifying any malicious machine.
Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India (surendranathsingh.bg@gmail.com)
No. of Downloads: 53 | No. of Views: 1469
Lingxi Xiao, Ruilin Xu, Yiru Cang, Yan Chen, Yijing Wei.
May 2024 - Vol 12, Issue 3
Anuj Kumar Kem, Ayush Chauhan, Mohan Agnihotri, Aniruddh Kumar.
May 2024 - Vol 12, Issue 3
Pravek Sharma, Dr. Rajesh Tyagi, Dr. Priyanka Dubey.
May 2024 - Vol 12, Issue 3