top of page

Author - 

Mrs. Anjali Sharma

Dr P. K. Gupta


A Cloud computing data security is discussed in this paper. Basically, it's a security analysis of cloud data. Data security across the network must be secured in the cloud, as we all know. To store massive amounts of data on the cloud, many businesses employ cloud computing. As a result, it is necessary to protect the data, whether it is text, audio, video, etc. Researchers have developed a variety of methods for protecting data on the cloud. Data protection methods and tactics utilized throughout the world to achieve optimum data security by reducing risks and threats will be discussed in detail in the paper discover by Multi-Tenancy in cloud computing.

Keywords: Cloud Computing, Data Security, Data-at-rest, Data-in-transit, Data-in-use, Data Encryption.


  • Sabahi, F. (2011). Cloud Computing Security Threats and Responses, in: IEEE 3rd International Conference on Communication software and Networks (ICCSN), 245-249. Retrieved from

  • Mathisen, E. (2011). Security Challenges and Solutions in Cloud Computing, in: International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011). 208-212.  10.1109/DEST.2011.5936627

  • Sharma, A., & Sinha, G. (2021). An Efficient Approach on Data Security with Cloud Computing Environment: A Comprehensive Research. e-ISSN 1309-4653 Retrieved from 

  • Hota, A., Mohapatra, S., & Mohanty, S. (2019). Survey of different load balancing approach-based algorithms in cloud computing: a comprehensive review. In Computational Intelligence in Data Mining (pp. 99-110).

bottom of page