Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    Data Security in Cloud Environments: A Review of Current Trends and Future Prospects

    Abstract

    This article covers data security in cloud computing. It is the study of data in the cloud and its related security. This article will introduce data protection procedures and global practices to ensure that data is protected as much as possible by reducing risks and threats. Keeping data in the cloud has been beneficial for many applications, but it creates risks by exposing data to applications that are already weakly secured. Similarly, using cloud virtualization without knowing the reliability of the guest can lead to the exposure of dangerous data that may be weakly secured when the guest runs on the hypervisor. This whitepaper will also provide information on data security during transmission and use. This work is based on all levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).

    Reviewer Photo

    Rajas Paresh Kshirsagar Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Rajas Paresh Kshirsagar Reviewer

    08 Oct 2024 05:45 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The research article addresses a critical aspect of modern technology—data security in cloud computing. Given the widespread adoption of cloud services, the relevance of this study cannot be overstated. The focus on global practices for data protection highlights its originality, as it seeks to navigate the complexities of safeguarding data across various service models (SaaS, PaaS, IaaS). By examining both the benefits and vulnerabilities associated with cloud storage, the authors contribute valuable insights to the ongoing discourse on cloud security.


    Methodology

    The methodology outlined in the research article appears comprehensive, focusing on the examination of data protection procedures and their implementation across different cloud service models. However, the article could benefit from a clearer explanation of the research approach—whether it involves case studies, surveys, or a literature review. Providing details about the criteria for evaluating security measures and how these measures are assessed would strengthen the methodological rigor.


    Validity & Reliability

    The validity of the findings seems sound, as the article is rooted in established practices and procedures for cloud data security. The emphasis on global practices suggests a broad perspective, enhancing reliability. Nevertheless, the inclusion of empirical data or case studies demonstrating the effectiveness of these practices in real-world scenarios would add weight to the claims. Addressing potential biases in the sources reviewed would further enhance the credibility of the research.


    Clarity and Structure

    The article is generally well-structured, making it easy to follow the discussion of data security in cloud computing. Each section logically builds on the previous one, aiding comprehension. However, the use of technical jargon without adequate explanation may hinder understanding for some readers. Simplifying the language or providing definitions for key terms would improve clarity, making the article more accessible to a wider audience, including those new to cloud technology.


    Result Analysis

    The result analysis in the research article provides a solid overview of the security challenges and solutions in cloud computing. By outlining the risks associated with data storage and transmission, the authors effectively highlight the importance of robust security measures. However, a deeper exploration of specific case studies or statistical data on breaches and the effectiveness of proposed solutions would enrich the analysis. This could provide concrete examples of success or failure, enhancing the practical implications of the research findings.

    Publisher Logo

    IJ Publication Publisher

    Done Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Rajas Paresh

    Rajas Paresh Kshirsagar

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp