Authors :
Zeel B Dabhi; Akanksha Kulkarni
Volume/Issue :
Volume 7 - 2022, Issue 12 - December
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3X356MQ
DOI :
https://doi.org/10.5281/zenodo.7505036
Abstract :
:- The importance of data security has been a
significant problem in information technology. Because
the data is spread out all over the place in the field of
technology, it becomes extremely problematic. Users'
primary worries regarding cloud computing are related
to data security and privacy security. Despite the fact that
numerous approaches to the issue of cloud computing
have been studied in academic research and clinical trials,
data security and privacy protection are becoming
increasingly crucial for the future use of cloud computing
technology in business, industry, and government. In the
cloud architecture, concerns about data security and
privacy security apply to both hardware and software.
This research aims to improve data security and privacy
security for a reliable cloud environment by examining
various security strategies and exceptions from both
software and hardware aspects for securing data in the
cloud. a comparison of the study that has already been
done on the data security and privacy security methods
utilised in cloud computing.
Keywords :
Cloud Computing, Data Security, Privacy, and Data Protection.
:- The importance of data security has been a
significant problem in information technology. Because
the data is spread out all over the place in the field of
technology, it becomes extremely problematic. Users'
primary worries regarding cloud computing are related
to data security and privacy security. Despite the fact that
numerous approaches to the issue of cloud computing
have been studied in academic research and clinical trials,
data security and privacy protection are becoming
increasingly crucial for the future use of cloud computing
technology in business, industry, and government. In the
cloud architecture, concerns about data security and
privacy security apply to both hardware and software.
This research aims to improve data security and privacy
security for a reliable cloud environment by examining
various security strategies and exceptions from both
software and hardware aspects for securing data in the
cloud. a comparison of the study that has already been
done on the data security and privacy security methods
utilised in cloud computing.
Keywords :
Cloud Computing, Data Security, Privacy, and Data Protection.