A DEEP DIVE INTO CLOUD DATA STORAGE SECURITY: VULNERABILITIES AND MITIGATION TECHNIQUES
Keywords:
Cloud Security, Data Storage, Vulnerability Assessment, Encryption, Access Control, Threat Mitigation, Cloud Computing, Information SecurityAbstract
The storage of data in the cloud has emerged as a vital part of the modern enterprise ITinfrastructure, while still, the security loopholes in cloud settings keep on putting enterprisesat the risk of losing data, failing to comply with regulations, and suffering major financial setbacks.
References
Anderson, P., Chen, W., and Roberts, K. (2024) 'Shared responsibility model in cloud computing: bridging the security gap between providers and customers', Journal of Cloud Computing Security, 12(3), pp. 245-267.


