COMPARATIVE STUDY OF CLOUD STORAGE SECURITY
Cloud storage services have become a fundamental component of modern digital infrastructure, enabling individuals and organizations to store, manage, and access data over the internet. With the rapid growth of digital transformation, remote work, and data-driven applications, the reliance on cloud platforms for data storage has increased significantly. However, this widespread adoption raises serious concerns regarding data security, privacy, and regulatory compliance. This study presents a comparative analysis of widely used cloud storage services including Google Drive, Dropbox, Microsoft OneDrive, and Amazon S3 with respect to their security architectures, encryption mechanisms, authentication models, access control policies, and compliance standards. The paper highlights the strengths and limitations of each service, emphasizing how differences in security design impact data confidentiality, integrity, and availability. By evaluating technical features such as encryption at rest and in transit, identity and access management, audit logging, data redundancy, and compliance with international security standards, this study provides a structured framework to help users and organizations select suitable cloud storage platforms based on security requirements. The findings underline the importance of combining provider-level security controls with organizational policies and user awareness to ensure comprehensive data protection in cloud environments.
J, A. (2026). Comparative Study of Cloud Storage Security. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.415
J, Ajay. "Comparative Study of Cloud Storage Security." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.415.
J, Ajay. "Comparative Study of Cloud Storage Security." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.415.
[2] Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, 2017.
[3] Stallings, W., Cryptography and Network Security, Pearson, 2017.
[4] Pfleeger, C. P., Security in Computing, Prentice Hall, 2015.
[5] Amazon Web Services, AWS Security Overview, 2023.
[6] Microsoft Corporation, Azure Security Documentation, 2023.
[7] Google Cloud Security Foundations Guide, 2023.
[8] Dropbox Business Security Whitepaper, 2022.
[9] ISO/IEC 27001:2013 Information Security Standard.
[10] General Data Protection Regulation (GDPR), EU 2016.