Cloud computing is the most popular research topic nowadays because of its capacity to lower processing costs while increasing scalability and flexibility for computer services. Cloud computing is internet-based computing that shares resources and delivers data to apps to provide users with on-demand services. Cloud computing is one of the fastest-growing IT fields in the business sector. The security of cloud computing has become a key roadblock to its expansion. Cloud computing security is a set of rules, processes, controls, roles, permissions, and technology that all work together to keep cloud-based systems and data safe. Cloud computing security has become a hot subject in academia and industry because cloud users must keep their data safe in the cloud. Users may lose trust in the cloud due to a lack of security. A review of cloud computing security is the subject of this research. All tiers of SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service), as well as deployment strategies, are included in the study (Private, Public, Hybrid, and Community Cloud). The major goal of this research is to investigate and comprehend existing genetic algorithms and two-factor authentication in the context of cloud computing security, as well as to identify gaps through a literature review.
Author(S) Details
Poonam Kumari
Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies, Faridabad, Haryana, India.
Meeta Singh
Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies, Faridabad, Haryana, India.
View Book:- https://stm.bookpi.org/RDST-V6/article/view/7015
No comments:
Post a Comment