Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{147886,
author = {VARUN SRIVASTAVA and RAJAT SRIVASTAVA and MOHD SALMAN KHAN},
title = {SECURE DATA TRANSFER IN CLOUD COMPUTING},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {5},
number = {11},
pages = {237-239},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=147886},
abstract = {Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance report, insider attacks are the sixth biggest threat in cloud computing. Therefore, cloud service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data centre. Additionally, data centers must be frequently monitored for suspicious activity.},
keywords = {AES Encryption, Cloud Computing, Key Generation, Virtual Machines},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry