SECURE DATA TRANSFER IN CLOUD COMPUTING

  • Unique Paper ID: 147886
  • PageNo: 237-239
  • Abstract:
  • Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance report, insider attacks are the sixth biggest threat in cloud computing. Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data centre. Additionally, data centers must be frequently monitored for suspicious activity.
add_icon3email to a friend

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{147886,
        author = {VARUN SRIVASTAVA and RAJAT SRIVASTAVA and MOHD SALMAN KHAN},
        title = {SECURE DATA TRANSFER IN CLOUD COMPUTING},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {5},
        number = {11},
        pages = {237-239},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=147886},
        abstract = {Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance report, insider attacks are the sixth biggest threat in cloud computing. Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data centre. Additionally, data centers must be frequently monitored for suspicious activity.},
        keywords = {AES Encryption, Cloud Computing, Key Generation, Virtual Machines},
        month = {},
        }

Cite This Article

SRIVASTAVA, V., & SRIVASTAVA, R., & KHAN, M. S. (). SECURE DATA TRANSFER IN CLOUD COMPUTING. International Journal of Innovative Research in Technology (IJIRT), 5(11), 237–239.

Related Articles