Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Data Security in Cloud Environments: A Review of Current Trends and Future Prospects

    Abstract

    This article covers data security in cloud computing. It is the study of data in the cloud and its related security. This article will introduce data protection procedures and global practices to ensure that data is protected as much as possible by reducing risks and threats. Keeping data in the cloud has been beneficial for many applications, but it creates risks by exposing data to applications that are already weakly secured. Similarly, using cloud virtualization without knowing the reliability of the guest can lead to the exposure of dangerous data that may be weakly secured when the guest runs on the hypervisor. This whitepaper will also provide information on data security during transmission and use. This work is based on all levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).

    Reviewer Photo

    Nishit Agarwal Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Nishit Agarwal Reviewer

    08 Oct 2024 05:34 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The article addresses a critical and timely issue in the field of cloud computing: data security. As more organizations transition to cloud services, understanding the associated risks and developing effective data protection procedures is highly relevant. The focus on global practices and procedures to mitigate threats adds originality to the discussion. By exploring the nuances of data exposure in weakly secured applications and virtualization contexts, the article contributes valuable insights to ongoing conversations about ensuring data integrity and security in cloud environments.


    Methodology

    The methodology seems to involve a comprehensive review of existing data protection practices and security measures within cloud computing frameworks. This approach allows for a broad overview of the current landscape. However, the article would benefit from a more structured explanation of how specific practices were selected for discussion. Including empirical evidence, case studies, or statistical data on the effectiveness of these practices would enhance the methodology, providing practical insights into their implementation and success rates.


    Validity & Reliability

    The validity of the article's claims regarding data security in cloud computing is strengthened by referencing established practices and frameworks. However, to enhance the reliability of the findings, the authors should address potential biases in the sources cited and consider the representativeness of the discussed data protection procedures. Acknowledging limitations in existing practices or potential gaps in research would provide a more balanced perspective and improve the overall reliability of the conclusions drawn.


    Clarity and Structure

    The article is generally well-structured, guiding readers through the introduction of data security challenges, followed by the presentation of protective measures. However, some sections could be clearer, particularly in explaining complex technical concepts. Simplifying jargon and providing clear definitions or examples would enhance accessibility for a broader audience. Additionally, ensuring smooth transitions between sections would improve the overall coherence of the article.


    Result Analysis

    The analysis effectively highlights the key challenges and risks associated with data security in cloud computing, particularly in relation to data transmission and virtualization. By discussing protection measures at various service levels (SaaS, PaaS, and IaaS), the article demonstrates a comprehensive understanding of the subject. However, the analysis could be strengthened by including specific examples of successful implementations of data protection practices, along with measurable outcomes such as reduced incidents of data breaches. Exploring future trends and developments in cloud security practices would also provide valuable insights into the evolving landscape of data protection in cloud environments.

    Publisher Logo

    IJ Publication Publisher

    Thank You Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Nishit

    Nishit Agarwal

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp