Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing.

Cite

CITATION STYLE

APA

Moudgil, Dr. M. R., Lamba, Dr. A. K., & Gupta, Er. P. (2020). Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 871–877. https://doi.org/10.35940/ijrte.a2186.059120

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free