International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 6 November-December 2024 Submit your research before last 3 days of December to publish your research paper in the issue of November-December.

An over Review of Faces and Paybacks of Cloud Computing and Motivation on Environment Security for Hybrid Encryption

Author(s) Vineshraj S, Dr P Ebby Darney
Country India
Abstract Cloud computing is a method that uses the remote services of another company to access resources, such as servers, software, and storage, over the Internet in exchange for a charge. In contrast to local hard drives or servers, this enables an organization to store and view data or programs virtually, that is, in a cloud. The origins of cloud computing can be traced to the 1950s, when mainframe computers were widely used in new businesses and educational institutions that were attempting to automate manual labor and create new tools using pre-existing languages as well as developing new, more human-friendly, higher-level languages. Due to a severe lack of skilled workers who could complete this task effectively during these periods, mainframe computers were extremely popular in the market. Everyone can now submit programs from dumb terminals, and the mainframe will process them according to priority and queue, eliminating the need for waiting. Because mainframe computers made CPU processing power and storage suddenly available, it was a better investment with many returns. In-depth discussions of cloud computing's various service and deployment models have been covered in the sections above. There is also a thorough discussion of the security problems and other important issues related to the cloud computing environment and its components. Setting a few goals for (A) It is suggested that new methods be researched and developed to improve end-user authentication security for end user in cross cloud environment. (B) Developing a method to automate the security check in recently installed cloud platforms is suggested. (C) By putting a new algorithm in IDS, it is suggested that the present attack detection and prevention mechanism in a multi-tenant environment be developed and critically examined. (D) According to this study, a framework is a set of guidelines for protecting the cloud computing environment from different types of outside threats. (E) Evaluation and comparison of previous software implementations of the aforementioned mechanism's speed/cost tradeoff.
Keywords Cloud Computing, environment security, hybrid encryption
Field Computer Applications
Published In Volume 6, Issue 6, November-December 2024
Published On 2024-12-10
Cite This An over Review of Faces and Paybacks of Cloud Computing and Motivation on Environment Security for Hybrid Encryption - Vineshraj S, Dr P Ebby Darney - IJFMR Volume 6, Issue 6, November-December 2024. DOI 10.36948/ijfmr.2024.v06i06.32667
DOI https://doi.org/10.36948/ijfmr.2024.v06i06.32667
Short DOI https://doi.org/g8vght

Share this