Home > Other Scientific Research Area > Other > Special Issue > Recent Advances in Computer Applications and Information Technology > Cloud Computing Security

Cloud Computing Security

Call for Papers

Volume-10 | Issue-3

Last date : 26-Jun-2026

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Cloud Computing Security


Trupti Gautam | Ayushi Bisane



Trupti Gautam | Ayushi Bisane "Cloud Computing Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026, pp.392-396, URL: https://www.ijtsrd.com/papers/ijtsrd101367.pdf

Cloud computing has transformed the way organizations store, process, and manage data by providing scalable, flexible, and cost-effective computing resources through the internet. Major cloud service providers such as Amazon Web Services, Microsoft, and Google offer platforms that allow businesses to deploy applications and infrastructure without maintaining physical hardware. Despite these advantages, cloud computing introduces several security challenges that must be addressed to ensure the confidentiality, integrity, and availability of data. Cloud computing security refers to the set of policies, technologies, and controls implemented to protect data, applications, and cloud infrastructure from cyber threats and unauthorized access. One of the major reasons organizations adopt cloud computing is the ability to access data and services remotely through the internet. However, this convenience also exposes systems to various cyber risks. Cyber attackers often attempt to exploit vulnerabilities in cloud environments to steal sensitive information or disrupt services. Data breaches, account hijacking, insecure interfaces, and misconfigured cloud settings are some of the most common security issues associated with cloud platforms. As organizations increasingly migrate their operations to the cloud, the need for strong security frameworks and best practices becomes critical. Cloud computing security operates under a shared responsibility model, where both the cloud service provider and the customer share responsibility for maintaining security. The service provider is responsible for securing the underlying infrastructure such as servers, storage systems, and networking components. On the other hand, the customer is responsible for protecting applications, data, user access, and configurations within the cloud environment. Understanding this shared responsibility model is essential to prevent security gaps and ensure proper protection of resources. Cloud services are generally categorized into three major models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each model has its own security considerations. In IaaS environments, users have more control over the operating system and applications, which means they are responsible for securing those components. In PaaS, the cloud provider manages more of the underlying infrastructure, while the user focuses mainly on application security. In SaaS models, the provider manages almost everything, but users must still ensure secure access and proper data handling practices. Therefore, security strategies must be tailored according to the specific cloud service model being used. Another important aspect of cloud computing security is data protection. Organizations store large amounts of sensitive data in cloud environments, including personal information, financial records, and confidential business documents. To prevent unauthorized access, various security mechanisms such as encryption, identity and access management (IAM), and multi-factor authentication (MFA) are used. Encryption protects data by converting it into unreadable formats that can only be accessed using authorized keys. IAM systems control who can access specific resources, while MFA adds an extra layer of authentication beyond simple passwords.

Cloud Computing, Cloud Security, Data Protection Encryption, Identity and Access, Management (IAM), Multi-Factor Authentication, Cyber security, muti-factor Authentication


IJTSRD101367
Special Issue | Recent Advances in Computer Applications and Information Technology, March 2026
392-396
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin