An Effective Security Mechanism for Users Data in Cloud Computing with Security Certification System
Gumma Parvathi Devi1
Assistant Professor, Department of CSE(AIML), CMR Technical Campus, Hyderabad .
Abstract: Data integrity is the reliability of the data, whereas cloud computing security is the protection of the data. Data security and integrity are two different concepts. As a result, they are both crucial in the field of cloud computing. The security and integrity of data are a top issue for users in relation to cloud computing. This essay's goal is to examine the risks and remedies related to the issues users of cloud computing must deal with regarding data security and data integrity. While data reliability is concerned with data accuracy, data protection is concerned with data security. A data security policy aims to lower the possibility of emails, medical records, corporate papers, and trade secrets leaking. In information technology, data integrity, security, and privacy are crucial. Data consistency, correctness, and reliability, on the other hand, ensure that digital data is not tampered with and that only authorised users may access or alter the data. Users can trust a number of sites since they utilise more understandable language to make their terms more transparent. The foundation of cloud computing is sharing computer resources among many users. A number of policies are created to guarantee legal compliance while safeguarding the data, programmes, and infrastructure related to cloud computing. We provide a test-based assurance scheme intended for grading security. Our plan evaluates how current certification procedures will be affected by changes to the cloud, systems, and methodology levels of certification. The suggested strategy reduces the likelihood of needless certificate revocation and, to the greatest extent possible, the volume of re-certification activities. To accomplish this, it re-validates existing certificates when pertinent changes are noticed by using the evidence that is already present in them.
Keywords: Cloud computing, security certification system, data security, distributed access.