Professional Documents
Culture Documents
16BIT058
GOHIL AJAY
Abstract
This study identifies issues related to cloud data storage such as data breach,
data theft and cloud data availability. Finally, we provide possible solutions to specific
problems in the cloud.
1. Introduction
Cloud computing offers nice advantages to
cloud shoppers like valuable services,Resource snap, easy accessibility through the
net, etc. From little to giant enterprises square measure on the
cloud aspect Relationships with computing and alternative firms to extend their
business [1].
These policies The grinding and CSP bring home the bacon decision harmonize
finished observations steerage because of the very fact drift of its vulnerability
Command over cloddish applications, hardware
and consumer observations. it's smart to code stabbing
Statistics forwards hosting knowledge privacy and confidentiality against CSP. a
collection space re Associate in Nursing coding craving is that it's fatal
Since shortly from may be a oustandingly amount of notice overheads on cloud access
models. Description notice, the cloud desires pin strategies for storing and
government knowledge privacy and confidentiality [2]. This shaping is effectiveness
Focuses on rivet vulnerabilities and problems on consumer knowledge and privacy.
Figure 1: Cloud data storage model.
2. Cloud Data Storage Challenges & Issues
4. Conclusion
Cloud computing architecture stores data and application software with
minimal maintenance effort and Provides on-demand service to customers over the
Internet. Cloud management does not trust the customer Valuable commitments or
policies. This can lead to many security issues with data storage, such as privacy,
Confidentiality, integrity and availability.
In this term paper we focus on data storage security issues in cloud
computing And we first presented a variety of security issues in cloud, deployment
models and data storage in the cloud environment. In the last section, we address
possible solutions to the data storage problems we present Privacy and privacy in a
cloud environment.
References
[1] A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud based health insurance plan recommendation
system: a user centered approach, Future Gener. Comput. Syst. (2014)
[2] P. Mell, T. Grance, The NIST definition of cloud computing (draft), NIST Special Publ. 800 (145)
(2011) 7.
[3] J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing,
Proc. Eng. 23 (2011) 586–593.
[4] R. Chandramouli, M. Iorga, S. Chokhani, Cryptographic key management issues and challenges in
cloud services, in: Secure Cloud Computing, Springer, New York, 2014, pp. 1–30.