Cloud computing and security issues in the cloud

Trinity Journal of Management, IT & Media (TJMITM)
Year: 2018 (Jan-Dec), Volume: (9), Issue. (1)
First page: (22) Last page: (27)
Online ISSN: A/F
Print ISSN: 2320-6470
doi: 10.48165/tjmitm.2018.0905

Cloud computing and security issues in the cloud

Santosh Kumar Singh1,Dr. P.K. Manjhi2,Dr. R.K. Tiwari3,Dr. V.R. Vadi4

1Research Scholar, Department of Computer Applications, Vinoba Bhave University, Hazaribag, India
2Assistant Professor, University Department of mathematics, Vinoba Bhave University, Hazaribag, India
3Professor, H.O.D CSE, R.V.S College of Engg. & Tech., Jamshedpur, India
4 Director, TIPS Dwarka, New Delhi, India

Corresponding author email id: santosh.trinity17@gmail.com

Received:
14 -04-2018

Accepted:
03-06-2018

Online Published:
23-07-2018

How to cite the Article

Singh, S. K., Manjhi, P. K., Tiwari, R. K., & Vadi, V. R. (2018). Cloud Computing and Security Issues in the Cloud. Trinity Journal of Management, IT & Media, 9(1), 22–27. https://doi.org/10.48165/tjmitm.2018.0905 Cite
Singh, Santosh Kumar, et al. “Cloud Computing and Security Issues in the Cloud.” Trinity Journal of Management, IT & Media, vol. 9, no. 1, 2018, pp. 22–27, http://doi.org/10.48165/tjmitm.2018.0905. Cite
1.
Singh SK, Manjhi PK, Tiwari RK, Vadi VR. Cloud Computing and Security Issues in the Cloud. TJMITM. 2018;9(1):22‑7. DOI: 10.48165/tjmitm.2018.0905 Cite
This image has an empty alt attribute; its file name is images.png
View on Google Scholar

ABSTRACT

Cloud computing has formed the conceptual and  infrastructural basis for tomorrow’s computing. The global  computing infrastructure is rapidly moving towards cloud  based architecture. While it is important to take advantages  of cloud based computing by means of deploying it in  diversified sectors, the security aspects in a cloud based  computing environment remains at the core of interest.  Cloud based services and service providers are being  evolved which has resulted in a new business trend based  on cloud technology. With the introduction of numerous  cloud based services and geographically dispersed cloud  service providers, sensitive information of different entities  are normally stored in remote servers and locations with  the possibilities of being exposed to unwanted parties in  situations where the cloud servers storing those  information are compromised. If security is not robust and  consistent, the flexibility and advantages that cloud  computing has to offer will have little credibility. This paper  presents a review on the cloud computing concepts as well  as security issues inherent within the context of cloud  computing and cloud infrastructure. 

KEYWORDS

Cloud computing, cloud service, cloud  security, computer network, distributed computing,  security.