Volume 20 No 20 (2022)
 Download PDF
Securing Data in the Cloud: An Analysis of Privacy and Security Concern
Mohummed Washeem, Dr Tarun Maini, Sushant Jhingran, Gourishankar Mishra, Pradeep Kumar Mishra
Abstract
Storing and processing sensitive information on the cloud has raised serious privacy and security concerns. Cloud computing poses various challenges such as data breaches, loss, insider threats, lack of transparency, shared infrastructure, compliance issues, identity and access management difficulties, data location and sovereignty concerns, and reliance on cloud service providers. To protect sensitive data and comply with data privacy regulations, it is crucial to implement a comprehensive privacy and security strategy in cloud computing. Ensuring the security of cloud computing is vital for both individuals and businesses and different cloud deployment models come with various security risks. A multi-faceted approach involving both providers and tenants is required to tackle these challenges. This article provides an overview of the primary privacy and security concerns in cloud computing and explores various solutions. It also analyzes the challenges of implementing privacy and security controls in the cloud and offers suggestions to improve privacy and security in cloud computing, including encryption, access control, authentication, and advanced persistent threat(APT) prevention. The objective of this paper is to provide recommendations for addressing these concerns and increase awareness of the importance of privacy and security in cloud computing
Keywords
Cloud computing, Security, Privacy
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.