Cloud computing is useful in providing easy-to-access high-performance computing, networking, and storage via the net. Future work should be geared toward working on data science/AI/ML services to protect user data to make data more secure. What are the three service models of the cloud? How do they differ for the consumer? Identify, define, and provide some examples of issues with potential solutions you may have experienced with your social media accounts.
Related Work
G.E.Blonder ,Dhamija et.al , and X. Suo et.al proposed a recognition-based graphical password system that authenticates users by choosing portfolios among decoy portfolios. He has discussed here many graphical password schemes have been proposed till now for securing data.
Paul. A.J, et.al has presented security in cloud computing environment mostly uses right now infrastructure as a service for the research.
Joshi Ashay Mukundrao, et.al, Hwan-Seok Yang, Muhammet Baykara, et.al explained that Cloud computing and Intrusion Detection and Prevention Systems are one such measure to lessen these attacks. Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies. He has given many research projects from the past have built intrusion detection systems and honeypot architectures based on virtual machine introspection (VMI) are discussed.
Muhammad Baqer Mollah, et.al, Sameer Rajan, et.al, Bhise given the proposed In this paper, author have evaluated and highlighted the various aspects of Cloud Computing to find the reality of the fifth generation computing in the form of cloud computing. There are numerous layers in present cloud computing architecture, service models, platforms, issues i.e. security, privacy, reliability, open standard and types. This paper explain all about the capable cloud computing technology i.e. its architecture, advantages, platforms, issues and challenges, applications, future and research selection of cloud computing. Here in this paper author explain the issue of how cloud consumers can make resourceprovisioning plan for their calculation. He tries to resolve number of instances mandatory to execute workload so as to attain optimization goal based on the uniqueness of workload and purchasing plans provided by Amazon EC2 which can considerably reduce the total cost acquire to customer.
Sultan Aldossary, et.al and Gagan,et.al explained that Cloud computing change the entire world as necessity grows day by day by moving the data into cloud. Data stored in the cloud which is in virtual machine use to share resources in cloud. Yunfei CI, et.al, Liangxuan Zhang, et.al explained that cryptography gives assurance to network and information security. In cryptography, attribute based encryption (ABE) is one of the technique to protect the data.
Lynn and Apurva Saxena et.al Here in this paper various models are proposed for honey pot to solve the problem of industries and that is used to captures the activities of attackers and maintains a log for
providing better security to the cloud network. An author proposed an algorithm to resolve some of the issues of network security. This paper presents the concept of production and research Honeypot as a service in cloud environment by implementing the benefits of Kerberos Authentication system, which distinguishes between hackers and users, and to provide overall security to the data/network.
In another paper offer an overview and multi-level feature analysis of seven enterprise server less computing platforms. The evaluation extant research on these platforms and identifies the surfacing of AWS Lambda as a de facto base platform for research on enterprise server less cloud computing.