Vignesh Joshi
University of Delhi
Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. The data storage in the cloud has been a promising issue in these days. This is due to the fact that the users are storing their valuable data and information in the cloud. The users should trust the cloud service providers to provide security for their data. Cloud storage services avoid the cost storage services avoids the cost expensive on software, personnel maintains and provides better performance less storage cost and scalability, cloud services through internet which increase their exposure to storage security vulnerabilities however security is one of the major drawbacks that preventing large organizations to enter into cloud computing environment. This work surveyed on several storage techniques and this advantage and its drawbacks.
Keywords Cloud computing  Data Storage  Data Security  Storage Techniques
Categories (categorize this paper)
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

 PhilArchive page | Other versions
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
Lockbox: Mobility, Privacy and Values in Cloud Storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
Cloud Computing and its Ethical Issues.J. Jeniffer - 2012 - Eubios Journal of Asian and International Bioethics 22 (4):155-157.
A Survey On Cloud Computing Security Issues.Dr V. Anuratha & M. Sasikala - 2016 - International Journal of Computer Science and Engineering Technology 2 (4).
Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
The Ethics of Cloud Computing.Boudewijn de Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
Internet of Things Future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.


Added to PP index

Total views
136 ( #80,938 of 2,461,803 )

Recent downloads (6 months)
63 ( #12,791 of 2,461,803 )

How can I increase my downloads?


My notes