WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

A SURVEY ON SECURITY CHALLENGES IN CLOUD COMPUTING

IVON CLARENCE

Download Paper

Paper Contents

Abstract

Cloud computing has emerged as a transformative technology that enables on-demand access to shared computing resources, including networks, servers, storage, applications, and services. By shifting data storage and processing responsibilities from local machines to remote cloud infrastructures, organizations can reduce capital expenditure, improve scalability, and enhance operational efficiency. Cloud services are typically delivered through three primary modelsInfrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)and deployed using private, public, hybrid, or community clouds. However, the rapid adoption of cloud computing introduces significant security challenges related to data protection, privacy, trust, compliance, and system vulnerabilities. Ensuring secure cloud environments requires robust security policies, cryptographic algorithms, and threat-mitigation strategies. Various encryption techniques, such as symmetric-key ciphers (DES, AES, Blowfish), asymmetric-key algorithms (RSA, DiffieHellman), and hashing methods (SHA, MD5), play a crucial role in safeguarding data stored in or transmitted through the cloud. Despite advancements, issues such as privileged access, data segregation, DDoS attacks, and inadequate recovery mechanisms remain critical concerns. This paper provides an overview of cloud computing concepts, service models, security architectures, cryptographic algorithms, and existing threats, highlighting the need for comprehensive security frameworks to enhance trust and encourage broader adoption of cloud technologies.

Copyright

Copyright © 2025 IVON CLARENCE. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS51200008853
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us