Methodical Application of “Defense in Depth” Security Techniques to Combat Data Storage Issues in Cloud Computing
| Vol-4 | Issue-5 | May 2019 | Published Online: 25 May 2019 PDF ( 281 KB ) | ||
| Author(s) | ||
| Rokesh Kumar Yarava 1; Dr. R. P Singh 2 | ||
|
1Faculty of PhD CSE SSSUTMS -Sehore, MP. (India) 2Supervisor, Faculty of PhD CSE SSSUTMS -Sehore, MP. (India) |
||
| Abstract | ||
Cloud computing is reforming numerous ecosystems by giving organizations computing resources including simple deployment, connectivity, configuration, automation and versatility. This change in outlook raises a wide scope of security and protection issues that must be mulled over. Multi-tenancy, loss of control, and trust are enter difficulties in cloud computing environments. Cloud computing is acquainting numerous gigantic changes with people's lifestyle and working pattern as of late for its innumerable advantages. Notwithstanding, the security of cloud computing is dependably the focal point of various potential cloud customers, and a major obstruction for its broad applications. The announced late accomplishment of cloud computing has pulled in consideration for cost compelling IT services with numerous signs for proceeding with spread out if not overwhelming in the coming years. In any case, challenges are being looked by both research and expert networks including quality solid services, enhanced structures and security. In the interim, IT services in Cloud computing face the staggering difficulties to guarantee the best possible physical, logical and work force security controls, particularly while considering the way that cloud computing moves the application software and databases to the vast data focuses. Also, while moving such substantial volumes of data and Software, the management of the data and services may not be completely trustworthy. In this paper, the fundamental center is given to highlight the security parts of data storage from points of view of dangers and attacks from one side and approaches for arrangements from the opposite side. The paper likewise proposes a powerful and adaptable circulated plot with two notable highlights, restricting to its ancestors. Our plan accomplishes the integration of storage accuracy protection and data error localization. |
||
| Keywords | ||
| Cloud Computing, Defense in Depth. | ||
|
Statistics
Article View: 425
|
||

