WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Investigating vulnerabilities in pluggable data in a ubiquitous environment using an algorithmic approach

SUYOG SUDHIR KULKARNI SUDHIR KULKARNI

Download Paper

Paper Contents

Abstract

In the IT sector, cloud computing is a hot study area that is used to distribute data and computing resources over the internet. The use of clouds is a new computer platform, in which the network is used to share the resources as a service. The primary function provided by cloud computing is cloud data storage, whereby The user has access to, and the data is handled, managed, and backed up during the connect. Because of the cloud, several sectors are embracing cloud computing with enthusiasm. capacities that a marginal asset can achieve. Nevertheless, the cloud keeps user data in somewhere that might lead to a data security breach. Consequently, safeguarding the cloud data is a significant problem that many sectors now face. But the data owner has amassed and saved the data on distant servers, and users can retrieve their data from the distant cloud servers that are not within the user's control. As a result, the collection of Data stored off-cloud presents a number of security challenges. Consequently, the One of the main areas of cloud computing study is cloud data protection. stage. Users benefit from enormous efficiency when data is outsourced to the cloud because They don't have to be concerned about maintaining hardware management.

Copyright

Copyright © 2023 SUYOG SUDHIR KULKARNI. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS31100005487
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us