Volume -I , Issue -VII, October 2014


Author(s) :

Archana Wagh , Sunny Bagga


Cloud computing takes advantage of virtualization technologies with self-service capabilities to offer cost-effective access to computing resources via the internet. This paper identifies the security and integrity concerns involved in cloud computing when data moves from one location to another. Security is one of the most difficult job to execute in cloud computing. Different types of attacks occur in the application and in the hardware components. To provide security different cryptographic algorithms are been used. The main aim of this paper is to collect information (survey) on secure environment for storage of data in cloud.


cloud computing,Saas,Paas,Laas, Private cloud, Public Cloud,Hybrid Cloud,Community Cloud

  1. 3.KawserWazedNafi, TonnyShekhaKar, SayedAnisulHoque, Dr. M. M. A Hashem, A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012.
    signs of unfaithful husband i cheated on my husband cheater
  2. 5.MAdhu Chauhan, Riidhei Malhotra, MukulPathakandUdayPratap Singh, DIFFERENT ASPECTS OF CLOUD SECURITY, Engineering Research and Applications (IJERA), ISSN: 2248-9622, www.ijera.com, Vol. 2, Issue 2, Mar-Apr 2012, pp.864-869.
  3. 7.Rabi Prasad Padhy,ManasRanjanPatra,Suresh Chandra Satapathy, “Cloud Computing: Security Issues and Research Challenges”,IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS),Vol. 1, No. 2, December 2011.
    infidelity in marriage how to cheat wives that cheat
  4. 1.John Harauz, Lori M. Kaufman, Bruce Potter, Data Security in the World of Cloud Computing, JULY/AUGUST 2009 15407993/09/$26.00 © 2009 IEEE COPUBLISHED BYTHEIEEE COMPUTERANDRELIABILITYSOCIETIES
  5. 2.Balachandra Reddy Kandukuri, Ramakrishna PaturiV, Dr.AtanuRakshit, Cloud Security Issues,2009 IEEE International Conference on Services Computing, 978-0-7695-3811-2/09 $26.00 © 2009 IEEE, DOI 10.1109/SCC.2009.84, 517, 2.
  6. 4.YounisA.Younis,MadjidMerabtiandKashifKifayat, Secure Cloud Computing for Critical Infrastructure :A Survey, ISBN: 978-1-902560-27-4 © 2013 PGNet.
  7. 6.Pankaj Arora,Rubal Chaudhry Wadhawan,Er. Satinder Pal Ahuja,”Cloud Computing Security Issues in Infrastructure as a Service”,International Journal of Advanced Research in Computer Science and Software Engineering,Volume 2, Issue 1, January 2012.
How to Cite this Paper? [APA Style]
Archana Wagh , Sunny Bagga, (2014), A SURVEY TO PROVIDE DATA SECURITY IN CLOUD COMPUTING, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=58&vid=7, (October, 2014)
Full Text in PDF

Full Article in PDF Format

Comment on this article...!!!

Previous Comments...
No previous comments.


Alert Me...!!!

When new article publish, article link will mail to your mail...

Enter Your Name :
Enter Your Email ID :

For Authors

For Readers