Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Date Added: Oct 2014
Cloud computing, even though known to have a malicious behavior, is an environment which enables convenient, efficient, and ready to use on demand network access to a pool of shared data resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is basically a centralized database where the clients or the organization store their data, retrieve data and possibly modify the data. To overcome challenges from cloud security, many state-of-the-art technical solutions, e.g., continuation protection mechanism, IDM, data security, and virtualization security have been adopted but due lack of users loss control of data dynamic operations on cloud have not been implemented.