An Examination on Cloud Computing Future, Privacy of Data and Possibilities
Supriyono1, Dodik Ariyanto2, Nongmaithem Ajith Singh3, K. Shankar4, Phong Thanh Nguyen5, Robbi Rahim6
1Supriyono, Universitas Muria Kudus, Indonesia.
2Dodik Ariyanto, Universitas Udayana, Indonesia
3Nongmaithem Ajith Singh, Assistant Professor, Department of Computer Science, South East Manipur College, Manipur, India.
4K. Shankar, Department of Computer Applications, Alagappa University, Karaikudi, India.
5Phong Thanh Nguyen, Department of Project Management, Ho Chi Minh City Open University, Vietnam.
6Robbi Rahim, Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia
Manuscript received on 15 September 2019 | Revised Manuscript received on 24 September 2019 | Manuscript Published on 10 October 2019 | PP: 949-953 | Volume-8 Issue-6S2, August 2019 | Retrieval Number: F12880886S219/19©BEIESP | DOI: 10.35940/ijeat.F1288.0886S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.
Keywords: Cryptography, Secure Data, Visualization.
Scope of the Article: Cloud Computing