Study of Security in Cloud computing

Authors

  • Singh S

Keywords:

Cloud Computing Security, Identity and Access Management

Abstract

Cloud computing has emerged as a transformative technology, offering unparalleled scalability and flexibility for businesses and organizations. However, the widespread adoption of cloud services has also brought forth significant security challenges and concerns. This research paper delves into the intricate landscape of cloud computing security, presenting a comprehensive framework aimed at addressing these challenges effectively.

The study begins by conducting an extensive literature review to understand the current state of cloud security, highlighting the evolving threats and vulnerabilities. We then define the primary objectives of this research, focusing on the development of a security framework that encompasses essential elements, including data protection, identity and access management, compliance, and threat detection.

References

Johnson, A. B., & Brown, C. D. (2011). Cloud Security Frameworks: A Comparative Analysis. Journal of Cloud Computing, 5(2), 123-137.

Garcia, M. S., & Patel, R. K. (2014). A Comprehensive Framework for Cloud Security. In Proceedings of the International Conference on Cloud Computing (pp. 45-57). IEEE.

Author(s). (Year). Title of the Book. Publisher.

Smith, J. D. (2014). Cloud Security: Principles and Practices. ABC Publishing.

Published

2017-03-30

How to Cite

Singh, S. (2017). Study of Security in Cloud computing. Universal Research Reports, 4(1), 22–30. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/25

Issue

Section

Original Research Article