A DEEP DIVE INTO CLOUD DATA STORAGE SECURITY: VULNERABILITIES AND MITIGATION TECHNIQUES

Authors

  • Sumit Gupta

Keywords:

Cloud Security, Data Storage, Vulnerability Assessment, Encryption, Access Control, Threat Mitigation, Cloud Computing, Information Security

Abstract

The storage of data in the cloud has emerged as a vital part of the modern enterprise ITinfrastructure, while still, the security loopholes in cloud settings keep on putting enterprisesat the risk of losing data, failing to comply with regulations, and suffering major financial setbacks.

References

Anderson, P., Chen, W., and Roberts, K. (2024) 'Shared responsibility model in cloud computing: bridging the security gap between providers and customers', Journal of Cloud Computing Security, 12(3), pp. 245-267.

Downloads

Published

2024-05-20

How to Cite

Sumit Gupta. (2024). A DEEP DIVE INTO CLOUD DATA STORAGE SECURITY: VULNERABILITIES AND MITIGATION TECHNIQUES. Journal of Computational Analysis and Applications (JoCAAA), 33(05), 3027–3049. Retrieved from https://www.eudoxuspress.com/index.php/pub/article/view/4057

Issue

Section

Articles