Volume 20 No 13 (2022)
Download PDF
A Review of Bidirectional Verification Techniques for Secure Storage in Cloud Computing
Dr. Ajay Jaiswal
Abstract
With cloud computing, you may significantly boost capacity or capabilities without investing in new
equipment, hiring new staff, or purchasing new software. Cloud computing has developed over the past
few years from a promising commercial concept to one of the fastest-growing segments of the IT
industry. The cloud data centres are where the most delicate data and information are transported,
where they are operated on virtual computing resources in the form of virtual machines. Security has
emerged as a key concern in cloud computing, limiting its expansion while complicating data privacy
and data protection issues continue to plague the industry. A new model developed for advancement
shouldn't end up endangering the current model. When used in a cloud setting, the cloud architecture
poses a serious danger to the security of current models. Users of various cloud services must be careful
and aware of the possibility of data breaches in the new environment. This study presents an in-depth
analysis of the different protected cloud storage options employing bidirectional protocols.
Keywords
bidirectional protocols, security, virtual computing resources, virtual machine
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.