A Survey on Cloud Security Issues and Solution

Cloud computing is modem system provides software tools and resources by internet as user demand. in the traditional way the user must download files to use it but now in cloud computing system the user can uses the shared software without need to download it in the device. Cloud computing based on distributed resources and services related to various organizations, so providing the security is more important process in cloud computing to allow user of protecting their resources from any attack. Cloud computing is one of interested system which used to solve of complex tasks and function using Artificial intelligence. It used in a large area of application filed which provides share files and devices based on cloud system. It is cover huge numbers of users. The main challenges in the cloud computing is related to provides security of the system and protect the system area which faced a number of attracters who aims to stole data or damage system. The study review the attaint of using block chain system to solve security issues in cloud storage.

[1]  Saad Almutairi,et al.  A new secure transmission scheme between senders and receivers using HVCHC without any loss , 2019, EURASIP J. Wirel. Commun. Netw..

[2]  Jane Grimson,et al.  Sharing Health-Care Records over the Internet , 2001, IEEE Internet Comput..

[3]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[4]  Wilhelm Hasselbring,et al.  The SI challenge in health care , 2000, CACM.

[5]  John Yeun,et al.  Decentralized Cloud Storage using Blockchain , 2019 .

[6]  Dahu Wang,et al.  Blockchain data-based cloud data integrity protection mechanism , 2020, Future Gener. Comput. Syst..

[7]  S. Manimurugan,et al.  A NOVEL SECRET IMAGE HIDING TECHNIQUE FOR SECURE TRANSMISSION 1 , 2017 .

[8]  Mohamed Hamdi,et al.  Security of Cloud Computing , 2015 .

[9]  Manimurugan Shanmuganathan,et al.  Review of advanced computational approaches on multiple sclerosis segmentation and classification , 2020, IET Signal Process..

[10]  Gerard Conway,et al.  Managing Cloud Computing - A Life Cycle Approach , 2012, CLOSER.

[11]  Hans-Arno Jacobsen,et al.  Blockchain Technology , 2018, Blockchain Regulation and Governance in Europe.

[12]  S. Manimurugan,et al.  Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network , 2020, IEEE Access.

[13]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[14]  S. Manimurugan,et al.  The clandestine image transmission scheme to prevent from the intruders , 2017 .