Loading

Risk Factors And Security Issues In Various Cloud Storage Operations
K.Sai Manoj1, K. Mrudula2, K.phani Srinivas3

1Dr.K.Sai Manoj* , CEO, Innogeecks Technologies and Professor in Amrita Sai Institute of Science and Technology, Paritala, AP, India.
2K. Mrudula, Assistant Professor, Amrita Sai Institute of Science and Technology, Paritala, AP, India.
3K.Phani Srinivas, Associate Professor, Amrita Sai Institute of Science and Technology, Paritala, AP, India.

Manuscript received on September 17, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 311-320 | Volume-8 Issue-12, October 2019. | Retrieval Number: A3912119119/2019©BEIESP K18150981119/2019©BEIESP | DOI: 10.35940/ijitee.K1815.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client’s trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What’s more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.
Keywords: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Standards.
Scope of the Article: Cloud Computing