CCEODSP-Cloud Computing Environment Observation for Data Security and Privacy
Ramalingam Sugumar1, L. Leelavathy2

1Dr. R. Sugumar, Professor & Director, Department of Computer Science, ChristhuRaj College, Trichy, Tamil Nadu, India.
2Mrs. L. Leelavathy, Assistant Professor, Department of Computer Science, Sri Meenakshi Vidiyal Arts and Science College, Trichy, Tamil Nadu, India.
Manuscript received on February 02, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on March 30, 2020. | PP: 878-883 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7341038620/2020©BEIESP | DOI: 10.35940/ijrte.F7341.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Today’s world, the cloud computing concepts has developed rapidly in both the private and public area, it is mainly provide the basic services and resources that are open to all kinds of end users on a particular platform through internet on a rented basis have the ability to extend up or down their service necessities or needs. This cloud computing model has numerous benefits including elasticity, scalability, efficiency, flexibility, etc. activities of a business organization. It bids a ground-breaking business concept for organizations to accept information technology enabled services without advance investment. Cloud computing model enables convenient, on-request network accessibility to a shared pool of IT computing resources like servers, services, storage networks, and applications. In this computing model can be speedily provisioned and released with negligible management exertion or service provider interaction. Quick variation of cloud computing had resulted in increasing strictness of privacy and security concerns as well as permissible challenges. In this learning includes various cloud computing issues that weakens of security and privacy of users data, as well as presents on threat that impacts data residing in the cloud and also added with this, a secure cloud computing open issues are noted in paper.
Keywords: Cloud Computing, elasticity, scalability, storage, Security.
Scope of the Article: Cloud Computing.