Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 119-128, July-September 2020 ISSN: 2456-883X www.ajast.net 119 A Brief Survey on Various Technologies Involved in Cloud Computing Security Vindhuja E. 1 & Dr.N.Umadevi 2 1 M.Phil Research Scholar, Department of Computer Science, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science (Affiliated to Bharathiar University), Coimbatore-641005, Tamil Nadu, India. 2 Associate Professor & Head, Department of Computer Science, Sri Jayendra Saraswathy Maha Vidyalaya College of Arts and Science, (Affiliated to Bharathiar University), Coimbatore-641005, Tamil Nadu, India. DOI: 10.38177/ajast.2020.4316 Article Received: 07 June 2020 Article Accepted: 21 August 2020 Article Published: 22 September 2020 1. Introduction In certain ways, cloud computing has become widely used, such as file sharing, real-time applications and communications. Big advances in cloud computing, including major development, appeared in recent decades. The practical deployment of these advancements, which can theoretically provide functionality on many fronts, has made cloud storage commonly accessible both in private and public sectors. The reliability of the services offered is very efficient at the same time numerous problems were occurred both for cloud customers and cloud service providers. Security in cloud storage is a crucial data safety subdomain and constitutes a significant barrier to the widespread implementation of cloud technology [1]. Because cloud-based systems simply use an Internet connection, they are open to a range of attacks and other security risks that can lead to serious consequences, including data leaks, malware intrusion, Denial-of-Service (DoS) attacks, lack of data and unsecured APIs [2]. According to [3], cases of vulnerability in the cloud world have increased in recent years mostly due to the significant rise in cloud resources. It has become apparent that several organizations and businesses have increasingly started to move their workloads to the cloud. The number of businesses switching to the cloud will rise to 83 percent by the end of 2020, according to a survey conducted by Logic Monitor [4] which is a leading SaaS-based performance management tool. Despite the advancements in cloud use, the implementation of this omnipresent infrastructure will face many major challenges. The study by a leading cloud computing firm, Right Scale [5], reports that the cloud protection issue continues to constitute a significant problem, along with increased investment, lack of infrastructure and knowledge and efficiency problems (including others). For this article, we performed a detailed survey to look at different forms of possible defense approaches associated with cloud computing security issues. The rest of this article has organized in the following. Section 2 covers similar studies in recent years on cloud security. In Section ABSTRACT In the past decade, big technical advances have appeared which can bring more comfort not only in the corporate sector but at the personal level of everyday life activities. The growth and deployment of cloud computing technologies by either private or public sectors were important. Recently it became apparent to many organizations and businesses that their workloads were moved to the cloud. However, protection for cloud providers focused on Internet connectivity is a major problem, leaving it vulnerable to numerous attacks. Although cloud storage protection mechanisms are being introduced in recent years. However, cloud protection remains a major concern. This survey paper tackles this problem by recent technology that enables confidentiality conscious outsourcing of the data to public cloud storage and analysis of sensitive data. In specific, as an advancement, we explore outsourced data strategies focused on data splitting, anonymization and cryptographic methods. We then compare these approaches for operations assisted by accuracy, overheads, masked outsourced data and data processing implications. Finally, we recognize excellent solutions to these cloud security issues. Keywords: Cloud computing, Security, Data splitting, Anonymization, Cryptographic techniques.