Cloud Security’s Impact on Human Activities

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 4, 2024 at 2:49 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Om K. Siddhapura, Ripalkumar N. Patel, Chirag C. Mavani

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. 1ML Engineer, Software Engineer, Security Analyst, IT Department, Mahalaxmi Engineering, Bhavnagar, IT Department, Mahalaxmi Engineering, Bhavnagar, IT Department, Mahalaxmi Engineering, Bhavnagar, Gujarat, Gujarat, Gujarat, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nCloud computing as an integral aspect of computer services has several aspects and factors whose contribution has been discussed focusing on human activities. The research has focused on analyzing how using cloud security affects job availability and skill requirements. In addition, the way cloud security impacts privacy positively has also been evaluated. Cloud computing privacy concerns in social networking and the role of cloud security in business, healthcare, and other critical decision- making areas has also been analyzed. In the current research, secondary analysis has been carried out provision summaries of existing literature and authentic numerical data has been presented. Thus, it has been concluded that cloud security is one of the most important parts that needs to be focused on while using the internet and technology. The study has highlighted different areas where cloud security has a major role, and the way cloud computing has been helpful.

n

n

n

Keywords: Cloud Computing, Security, Secure Cloud System, Privacy Breach, Decision Making

n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Recent Trends in Parallel Computing(rtpc)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Om K. Siddhapura, Ripalkumar N. Patel, Chirag C. Mavani Cloud Security’s Impact on Human Activities rtpc April 4, 2024; 11:-

n

How to cite this URL: Om K. Siddhapura, Ripalkumar N. Patel, Chirag C. Mavani Cloud Security’s Impact on Human Activities rtpc April 4, 2024 {cited April 4, 2024};11:-. Available from: https://journals.stmjournals.com/rtpc/article=April 4, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘rtpc’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1. Akhtar N, Kerim B, Perwej Y, Tiwari A, Praveen S. A Comprehensive Overview of Privacy and Data Security for Cloud Storage. International Journal of Scientific Research in Science Engineering and Technology. 2021 Sep 18.
2. What is Cloud Security? Cloud Security Defined | IBM. Ibm.com. 2024. Available from: https://www.ibm.com/topics/cloud-security
3. Statista. How confident are you that your current access security solutions can effectively enable employees to work remotely in a secure and easy manner?. Available from: https://www.statista.com/statistics/1359587/confidence-on-global-remote-work-access-security-solutions/
4. Tabrizchi H, Kuchaki Rafsanjani M. A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing. 2020 Dec;76(12):9493–532.
5. Kaushik M, Guleria N. The impact of pandemic COVID-19 in workplace. European Journal of Business and Management. 2020 May 31;12(15):1–10.
6. Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics. 2021 Dec 22;11(1):16.
7. Lightcast.io (2023). Lightcast is a global leader in labor market analytics. https://lightcast.io/about/company
8. Yang P, Xiong N, Ren J. Data security and privacy protection for cloud storage: A survey. IEEE Access. 2020 Jul 16;8:131723–40.
9. Janssen M, Brous P, Estevez E, Barbosa LS, Janowski T. Data governance: Organizing data for trustworthy Artificial Intelligence. Government Information Quarterly. 2020 Jul 1;37(3):101493.
10. Market. Social Media Security Market Research Report–Forecast till 2032. Marketresearchfuture.com. 2022. Available from: https://www.marketresearchfuture.com/reports/social-media-security-market-6842
11. Amaraweera SP, Halgamuge MN. Internet of things in the healthcare sector: overview of security and privacy issues. Security, privacy and trust in the IoT environment. 2019:153–79.
12. Sobb T, Turnbull B, Moustafa N. Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics. 2020 Nov 6;9(11):1864.
13. Saura JR, Ribeiro-Soriano D, Palacios-Marqués D. Assessing behavioral data science privacy issues in government artificial intelligence deployment. Government Information Quarterly. 2022 Oct 1;39(4):101679.
14. Mishra S, Tyagi AK. The role of machine learning techniques in internet of things-based cloud applications. Artificial intelligence-based internet of things systems. 2022:105–35.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Recent Trends in Parallel Computing

n

[if 344 not_equal=””]ISSN: 2393-8749[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received January 17, 2024
Accepted February 1, 2024
Published April 4, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]