Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.4

Submission
Last date
28-Aug-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-4. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  Cloud Computing Security
PaperId: :  25424
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 10 Issue 6 2024
DUI:    16.0415/IJARIIE-25424
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Vishal YadavPoornima Institute of Engineering and Technology

Abstract

Computer Science & Engineering
Cloud Computing Security, Data Encryption, Anomaly Detection, Zero-Trust Architecture, Privacy-Preserving Techniques, Quantum Encryption, AI-driven Security, Homomorphic Encryption, Blockchain Technology, Fog Computing, Intrusion Detection System (IDS).
Cloud computing is now one of the pillars of online computing providing scalable and flexible services. Nevertheless, the growing cloud technology adoption has led to massive security challenges such as data breaches, unauthorized access, and susceptibility to cyber attacks. In particular, this review paper covers some of the latest literature that has been published from 2019 to year 2024 related to cloud computing security, including potential solutions based on encryption mechanisms, anomaly detection, trust models, as well as recent advancements and trends toward quantum and AI/ML-driven solutions. Through these studies, we intend to provide a holistic view of the progress, challenges, and future directions for cloud security.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Vishal Yadav. "Cloud Computing Security" International Journal Of Advance Research And Innovative Ideas In Education Volume 10 Issue 6 2024 Page 1223-1225
MLA Vishal Yadav. "Cloud Computing Security." International Journal Of Advance Research And Innovative Ideas In Education 10.6(2024) : 1223-1225.
APA Vishal Yadav. (2024). Cloud Computing Security. International Journal Of Advance Research And Innovative Ideas In Education, 10(6), 1223-1225.
Chicago Vishal Yadav. "Cloud Computing Security." International Journal Of Advance Research And Innovative Ideas In Education 10, no. 6 (2024) : 1223-1225.
Oxford Vishal Yadav. 'Cloud Computing Security', International Journal Of Advance Research And Innovative Ideas In Education, vol. 10, no. 6, 2024, p. 1223-1225. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/Cloud_Computing_Security_ijariie25424.pdf (Accessed : ).
Harvard Vishal Yadav. (2024) 'Cloud Computing Security', International Journal Of Advance Research And Innovative Ideas In Education, 10(6), pp. 1223-1225IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/Cloud_Computing_Security_ijariie25424.pdf (Accessed : )
IEEE Vishal Yadav, "Cloud Computing Security," International Journal Of Advance Research And Innovative Ideas In Education, vol. 10, no. 6, pp. 1223-1225, Nov-Dec 2024. [Online]. Available: https://ijariie.com/AdminUploadPdf/Cloud_Computing_Security_ijariie25424.pdf [Accessed : ].
Turabian Vishal Yadav. "Cloud Computing Security." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 10 number 6 ().
Vancouver Vishal Yadav. Cloud Computing Security. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2024 [Cited : ]; 10(6) : 1223-1225. Available from: https://ijariie.com/AdminUploadPdf/Cloud_Computing_Security_ijariie25424.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Skin Cancer Detection through Neural Network on Federated LearningComputer ScienceKavya Shree A S Download
Analyzing Member Engagement through Business Intelligence: A Metabase-Driven Dashboard for Registrations, Redemptions, and TransactionsData AnalyticsAnusha S Download
Detection of fake news using Machine Learning techniquesComputer ApplicationsJanani S R Download
MACHINE LEARNING-BASED STRESS DETECTION USING PHYSIOLOGICAL SIGNALS FROM WEARABLE SENSORSComputer Science and EngineeringAkash S K Download
Optimizing Resource Allocation and Task Offloading for Real-Time IoT ApplicationsComputer ApplicationsDhanush M Download
Examining Human-Computer Interaction in Social Media PlatformsComputer ApplicationsTanuja A Download
Interpretable Multimodal Machine Learning for Early Stroke Risk‬ ‭ Prediction in Atrial Fibrillation PatientsComputer Science and EngineeringAnand Hadapad Download
5G and IoT Integration for Smart CitiesComputer EngineeringYathish K J Download
Design and Development of Automated User Responsive Assistant (AURA) or Kinetically Responsive Intelligent Assistant (KRIA) RobotArtificial IntelligenceChandana S Download
Ethical Hacking: Proactive Security Against Cybercrimecomputer engineeringShahapuram Ritika Download
Cyber Security For Wearable Health Devicescomputer Engineering Jenitha H S Download
Artificial Intelligence in Integrated Circuit Design: Revolutionizing Productivity Amidst Practical ChallengesTechnologyKhanh Pham Duy Download
Real-Time Hand Gesture Recognition with Finger Counting (Using OpenCV and Mediapipe)Computer scienceBhumika Sahu Download
Diffie Hellman Key Exchange Algorithm with Man in the middle attack (MITM)Computer Science EngineeringMahesh Purushottam Gajbhiye Download
AN IMPROVED ATTRIBUTE BASED ACCESS CONTROL IN PERSONAL HEALTH RECORDS USING CLOUD WITH CONSTANT CIPHERTEXT LENGTHScience and TechBitrus Isahaka Dzarma Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.