Open Access   Article Go Back

Cloud Security Threats and Issues-A Review

R. Sood1 , R. Sharma2

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-4 , Page no. 115-119, Apr-2017

Online published on Apr 30, 2017

Copyright © R. Sood, R. Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Sood, R. Sharma, “Cloud Security Threats and Issues-A Review,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.115-119, 2017.

MLA Style Citation: R. Sood, R. Sharma "Cloud Security Threats and Issues-A Review." International Journal of Computer Sciences and Engineering 5.4 (2017): 115-119.

APA Style Citation: R. Sood, R. Sharma, (2017). Cloud Security Threats and Issues-A Review. International Journal of Computer Sciences and Engineering, 5(4), 115-119.

BibTex Style Citation:
@article{Sood_2017,
author = {R. Sood, R. Sharma},
title = {Cloud Security Threats and Issues-A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {115-119},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1253},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1253
TI - Cloud Security Threats and Issues-A Review
T2 - International Journal of Computer Sciences and Engineering
AU - R. Sood, R. Sharma
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 115-119
IS - 4
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
908 474 downloads 450 downloads
  
  
           

Abstract

Cloud Computing is one of the best on-demand network access service available to a large shared pool of computing resources in today’s world. There are various economic benefits of cloud computing which are widely recognized. Cloud computing help users to avail benefits of having large storage (IAAS), variety of OS (PAAS) and other softwares (SAAS) at their premises without the need to have them at their own hardware level. Apart from these economic benefits, public clouds still haven’t seen widespread adoption, especially by enterprises. Most large organizations today run private clouds, in the sense of virtualized and geographically distributed data centers, but rarely rely primarily on externally managed resources. Major reason behind this is the security concerns involved in existing cloud infrastructures which includes hardware failures, software bugs, power outrages, server miniconfiguration, malware and inside threats. The aim of this paper is to throw light on various Cloud security threats and issues as well as security issues inherent within the context of cloud computing and cloud infrastructure.

Key-Words / Index Term

IAAS, PAAS, SAAS multi-tenancy, orchestratio

References

[1]. A.A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou, “Efficient Password based Two Factors Authentication in Cloud Computing”, International Journal of Security and Its Applications, Vol. 6, No. 2 , pp.143-148, 2012
[2]. S. Renu, OHH Parveen, “Biometric Based Approach for Data Sharing in Public Cloud”, International Journal of Advanced Research in Computer and Communication Engineering Vol.4, Issue.2 pp.1-9, 2015
[3]. Mithilesh Mittal, Pradeep Sharma and Pankaj Kumar Gehlot, “A Comparative Study of Security Issues& Challenges of Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.5, pp.9-15, 2013.
[4]. Vivek Raich, Pradeep Sharma, Shivlal Mewada and Makhan Kumbhkar, “Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.13-16, 2013.
[5]. R. Buyyaa, C. S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, “Cloud Computing and Emerging IT platforms: Vision Hype and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, Vol.25, Issue.6, pp. 599-616, 2009.
[6]. W. Publishing, J. Wiley, B.Sosinsky, “Cloud Computing Bible” Published by Wiley Publishing, US, pp.1-480, 2010.
[7]. S. Shukla, D. kumar, “Clouds Software- Security as a Service(S-SaaS) via Biometrics”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.119-124, 2014.
[8]. N. Mead, et ai, “Security quality requirements engineering (SQUARE) methodolgy”, ACM SIGSOFT Software Engineering, Vol.30 Issue.4, pp.1-7, 2005
[9]. JW. Rittinghouse, JF. Ransome, “Cloud Computing”, Taylor and Francis Group, US, pp.1-284, 2010.
[10]. A. Bansal, A. Agrawal, “Providing Confidentiality, Integrity and Atomicity for data stored in the cloud storage”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.10, pp.65-70, 2016.
[11]. Rakesh Prasad Sarang and Rajesh Kumar Bunkar, “Study of Services and Privacy Usage in Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.6, pp.7-12, 2013.
[12]. V.K. Saxena, S. Pushkar, “Privacy Preserving using Encryption Proxy in Data Security”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.36-41, 2017.