SECURE DATA TRANSFER IN CLOUD COMPUTING
Author(s):
VARUN SRIVASTAVA, RAJAT SRIVASTAVA, MOHD SALMAN KHAN
ISSN:
2349-6002
Cite This Article:
SECURE DATA TRANSFER IN CLOUD COMPUTINGInternational Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 11 ,Page(s):237-239 ,April 2019 ,Available :IJIRT147886_PAPER.pdf
Keywords:
AES Encryption, Cloud Computing, Key Generation, Virtual Machines
Abstract
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance report, insider attacks are the sixth biggest threat in cloud computing. Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data centre. Additionally, data centers must be frequently monitored for suspicious activity.
Article Details
Unique Paper ID: 147886

Publication Volume & Issue: Volume 5, Issue 11

Page(s): 237 - 239
Article Preview & Download




Go To Issue



Call For Paper

Volume 6 Issue 4

Last Date 25 September 2019


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:8200 61 5067
Email: editor@ijirt.org
Website: ijirt.org

Policies