Loading

Security Techniques for Protecting Data in Cloud
Smile Mahajan1, Sandeep Sharma2

1Smile Mahajan*, Dept. of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar, Punjab, India
2Dr. Sandeep Sharma, Dept. of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar, Punjab, India

Manuscript received on November 15, 2019. | Revised Manuscript received on 20 November, 2019. | Manuscript published on December 10, 2019. | PP: 2348-2353 | Volume-9 Issue-2, December 2019. | Retrieval Number: A5043119119/2019©BEIESP | DOI: 10.35940/ijitee.A5043.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing can store and manage the large amount of data. Storing the data on to cloud is widespread among companies additionally as private users. It permits its users to access the cloud services from the different locations. It wants solely a working internet connection to access the cloud services. A lot of attention is gained by cloud still there are some problems that need to be taken in considerations(i.e. data security, privacy and reliability)in which data security is one in all the most problems. The biggest challenge in the cloud is to maintain the integrity and confidentiality of data. Many techniques are urged for data protection in cloud. This paper focuses on the present security techniques for shielding the data in cloud. The paper has been carried out on the basis of cryptography, intrusion detection, attacks solutions, Data integrity and privacy as well as authentication and identity. 
Keywords: Cloud Computing, Data protection, Security techniques.
Scope of the Article: Cloud Computing