Aim of the project
The aim of this project is to analyze threats in cloud computing and their possible solutions.
Method
A research survey is conducted for the identification of cloud computing usage and security mechanisms along with steps taken for security are also identified.
Results
Results show that every technology connected to the internet always possesses a security threat and cloud computing also thus falls under the security threat region.
Discussion
Measures are always taken for security but are the measures adequate? Does the threat of security being reduced or does it increase over time? These questions are our focal points here.
Conclusion
It is concluded through the conducted research that the current security measures are inadequate and new security mechanisms are needed to be devised.