Loading...
ISSN No: 2349-2287 (P) | E-ISSN: 2349-2279 (O) | E-mail: editor@ijiiet.com
Author : V.Chiranjeevi, P.Ashwini, S.Nagamani
Abstract :
The technology that supports cloud computing is fraught with security risks. Data privacy and integrity, infrastructure stability, and protection against attacks are a few of them. Centralized and decentralized cloud computing are the two main concepts used by today's cloud computing infrastructures. Data leaks, outages, and other security dangers are all too real with centralized cloud computing. Data is better safeguarded by encryption using Reid Solomon erasure coding, and decentralized cloud computing is more robust to failures thanks to geo-redundancy technology. Computing in the Cloud; Decentralized Cloud Computing; Blockchain; Geo-Redundancy;Security Practices; Cybersecurity; Data Integrity; etc.