Resolving Cloud Vulnerability From Hijacking Using Illegal Security Access And Secure Conformity

  • S.Shobana, P. Jeyamedona, D.Shankar , N. Keerthana , S.Radha Rammohan

Abstract

Cloud computing is a technology used nowadays in larger scale which uses accumulating and access of large amount of data in a single external cloud. The main use of cloud is that it will reduce the cost and maintenance of the resources and infrastructure. This technology gives the applications resilience, protection and redundancy and hence has been used by various organizations. The major concern in cloud computing is that since it involves an external person the security of the cloud is a major problem. Lots of security attacks are happening in the cloud which makes the applications more vulnerable. The proposed system deals with some of the security challenges the cloud is facing and also the solutions to overcome this. The following are some of the security issues, Hijacking and illegal access control, Risk inside organization, cloud Vulnerabilities in app and system and Secure conformity. Various solutions to overcome these issues are discussed below.

Published
2020-05-15
How to Cite
S.Shobana, P. Jeyamedona, D.Shankar , N. Keerthana , S.Radha Rammohan. (2020). Resolving Cloud Vulnerability From Hijacking Using Illegal Security Access And Secure Conformity. International Journal of Advanced Science and Technology, 29(12s), 1251 - 1256. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/22606
Section
Articles