DATA SECURITY IN CLOUD: A REVIEW

Full Article - PDF

Published: 2022-09-24

Page: 1099-1106


SANDESH ACHAR *

Erie Cir, Milpitas, California, United States.

HRISHITVA PATEL

State University of New York, Binghamton, United States.

SANWAL HUSSAIN

Federal Urdu University of Arts, Sciences & Technology, Islamabad, Pakistan.

*Author to whom correspondence should be addressed.


Abstract

Although many apps benefit from having access to data on the cloud, doing so exposes data to applications that may already have security flaws. The security of data in the cloud is covered in this essay. It is an investigation of cloud data and all security-related aspects of it. In order to provide maximum data protection by lowering risks and threats, the paper will go into detail on data protection methods and tactics utilised globally.

Insights on data security issues for Data-at-Rest and Data-in-Transit will also be provided in the paper. The analysis is based on all cloud services, including platform as a service (PaaS), infrastructure as a service (IaaS), and software as a service (SaaS) (Software as a Service).

Keywords: Cloud computing, data protection, data security, privacy, risks, threats


How to Cite

ACHAR, S., PATEL, H., & HUSSAIN, S. (2022). DATA SECURITY IN CLOUD: A REVIEW. Asian Journal of Advances in Research, 5(1), 1099–1106. Retrieved from https://mbimph.com/index.php/AJOAIR/article/view/3161

Downloads

Download data is not yet available.

References

Abbate P. 2020 Internet Crime Report. Federal Bureau of Investigations. 2021;3.

Available:https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf

Schulze H. 2020 Cloud Security Report [ISC2]. Cybersecurity INSIDERS. 2021;8.

Available:https://www.cybersecurity-insiders.com/wp-content/uploads/2020/08/2020-Cloud-Security-Report-ISC2.pdf&ved=2ahUKEwi05dLb04_6AhV7xQIHHaMuCOcQFnoECA0QAQ&usg=AOvVaw3VnzUFhyieI7fwKTTrQclM

Amazon Web Services. AWS Security and Compliance Quick Reference Guide. AWS. 2021;8.

Available:https://d1.awsstatic.com/executive-insights/en_US/guide-security-compliance-quick-reference.pdf

Lance A, Chuvakin A. Designing and deploying a data security strategy with Google Cloud. Google Cloud. 2021;10.

Available:https://cloud.google.com/blog/products/identity-security/start-a-data-security-program-in-a-cloud-native-way-on-google-cloud

App security not keeping up with rapid development — Radware. [Blog]; 2021.

Retrieved 12 September 2022, from https://securitybrief.com.au/story/app-security-not-keeping-up-with-rapid-development-radware/