Mayank Pandey, Anuwanshi Sharma
This license enables reusers to distribute, remix, adapt, and build upon the material in any medium or format for noncommercial purposes only, and only so long as attribution is given to the creator.
Today, many Internet related technologies support us at every turn of our lives. Cloud computing is one of them which attracts more and more attention. Cloud computing is used to maintain, organize, and control as it owns mind computer resources online. It provides data and information, infrastructures, and software online. With the help of cloud storage, users can store and manipulate their data on the Internet and easily access it from every where in the vast world. Cloud events have come up recently in the market and attract a lot of businessmen or women. Its demand is increasing day by day among almost all organizations. However, like any other technology, it also has some risk factors. Since privacy is a significant concern for any organization, safely assessing data becomes the biggest concern. Cloud security is one of the most critical problems slowing cloud growth. Illegal attacks on cloud service systems, data leaking, data stealing, and data manipulation are frequently increasing. To provide safe and secure communication and transport of valuable and confidential information or data. This paper provides a review of some risk factors and security measures in the field of cloud computing and also concerns some security techniques companies use to secure user data.
Below is the link to the supplementary material.
Mayank Pandey, Anuwanshi Sharma. A Comparative Analysis on Various Cloud Service Providers. Int Jr of Forensic Sci.2024;2(2):73–78.
This license enables reusers to distribute, remix, adapt, and build upon the material in any medium or format for noncommercial purposes only, and only so long as attribution is given to the creator.
Download citation
Received | Accepted | Published |
---|---|---|
December 02, 2023 | February 01, 2024 | December 01, 2024 |
Sunday 08 June 2025, 05:46:36 (IST)
View full article metrics including social shares, article views and publishing history
Highlight selected keywords in the article text.
Received | December 02, 2023 |
Accepted | February 01, 2024 |
Published | December 01, 2024 |
This license enables reusers to distribute, remix, adapt, and build upon the material in any medium or format for noncommercial purposes only, and only so long as attribution is given to the creator.