Review and Evaluation of Security Issues on Cloud Computing
Vikram Gupta1, Sarvjit S. Bhatia2

1Vikram Gupta, Research Scholar, Department of CSE, Uttarakhand Technical University, Dehradun, India.
2Dr. Sarvjit Singh Bhatia, PG Department of Computer Science, GSSDGS Khalsa College Patiala, India.

Manuscript received on 24 January 2019 | Revised Manuscript received on 30 March 2019 | Manuscript published on 30 January 2019 | PP: 322-326 | Volume-7 Issue-6, March 2019 | Retrieval Number: E2075017519©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With globalization, blends and tremendous amount of electronic data usage, the consumer demands for the innovative techniques of data processing concerns. These issues require enterprises to rethink the strategies for utilizing the resources in an efficient manner. In order to gain and increase a competitive advantage, these enterprises are enforced to move accelerative to be more capable, flexible, efficient, and innovative. To meet the present generation demands for utilizing the resources of Information Technology, Cloud computing emerges the most important paradigm that provides on demand business services globally. In Cloud Computing, resources and applications are available on-demand on the internet. In this context the concept of third party is evolved which provides the services to the end users. By adopting the cloud computing, some social issues like trust, privacy, compliance and legal matters appears. On the adoption of cloud computing in the organizations, the outsourcing of data and trade as well as business applications to a third party causes the issues related to security and privacy critically. As a large amount of depository of the heterogeneous companies are placed in cloud, there is need to have the safety of the cloud environment. With the constant increase in the utility of cloud computing day by day, there must be a genuine effort to review and evaluate the current latest trends and evolutions in security. In this paper, a survey of different cloud computing models, different security risks, counter measures of security in cloud computing that affect the cloud environment in the area of confidentiality, integrity and computing on data are thoroughly reviewed.
Keywords: Cloud computing, CSP, DDoS, DoS, IaaS, PaaS, SaaS.
Scope of the Article: Cloud computing