Threats and Vulnerabilities of Cloud Computing: A Review
P.S. Suryateja1
- CSE Dept., Vishnu Institute of Technology, Bhimavaram, India.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-3 , Page no. 297-302, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.297302
Online published on Mar 30, 2018
Copyright © P.S. Suryateja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P.S. Suryateja, “Threats and Vulnerabilities of Cloud Computing: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.
MLA Style Citation: P.S. Suryateja "Threats and Vulnerabilities of Cloud Computing: A Review." International Journal of Computer Sciences and Engineering 6.3 (2018): 297-302.
APA Style Citation: P.S. Suryateja, (2018). Threats and Vulnerabilities of Cloud Computing: A Review. International Journal of Computer Sciences and Engineering, 6(3), 297-302.
BibTex Style Citation:
@article{Suryateja_2018,
author = {P.S. Suryateja},
title = {Threats and Vulnerabilities of Cloud Computing: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {297-302},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1799},
doi = {https://doi.org/10.26438/ijcse/v6i3.297302}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.297302}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1799
TI - Threats and Vulnerabilities of Cloud Computing: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - P.S. Suryateja
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 297-302
IS - 3
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
1797 | 723 downloads | 347 downloads |
Abstract
Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-use model for billing customers and providing other features like elasticity, ubiquity, scalability, and availability of resources for businesses. Cloud computing provides delivery models like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) which can be utilized by various organizations to solve their data storage and processing needs. From recent surveys conducted by well known reputed cloud providers, it is apparent that more and more organizations and enterprises are moving their workloads to cloud. The top concern among the organizations to move their workloads or processes to cloud is security. Even though the security measures provided in cloud computing are evolving over the years, it still remains as a major challenge or obstacle. This paper provides an overview of numerous threats and vulnerabilities of cloud computing which can act as a guide to decision makers in organizations to evaluate the security in clouds.
Key-Words / Index Term
Cloud Computing, Cloud Security, Cloud Threats, Cloud Vulnerabilities
References
[1] K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013.
[2] P. S. Suryateja, "A Comparative Analysis of Cloud Simulators," Int. J. Mod. Educ. Comput. Sci., vol. 8, no. 4, pp. 64–71, 2016.
[3] Tripwire Top Cloud Security Threats - https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/ (last accessed on Mar, 2018)
[4] CSOonline Top Cloud Security Threats 2018 - https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html (last accessed on Mar, 2018)
[5] Comparethecloud 8 Public Cloud Security Threats - https://www.comparethecloud.net/articles/8-public-cloud-security-threats-to-enterprises-in-2017/ (last accessed on Mar, 2018)
[6] Tierpoint Top 5 Cloud Data Security Threats - https://www.tierpoint.com/top-5-cloud-data-security-threats-in-2018/ (last accessed on Mar, 2018)
[7] Techtarget Five Cloud Security Threats to Combat in 2018 - http://searchcloudcomputing.techtarget.com/tip/Five-cloud-security-threats-to-combat-in-2018 (last accessed on Mar, 2018)
[8] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013
[9] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[10] N. Khan and A. Al-yasiri, "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework," Procedia - Procedia Comput. Sci., vol. 94, pp. 485–490, 2016.
[11] G. Somani, M. Singh, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing : Issues , taxonomy , and future directions," Comput. Commun., vol. 107, pp. 30–48, 2017.
[12] B. Varghese and R. Buyya, "Next Generation Cloud Computing: New Trends and Research Directions," vol. 2017, no. September, pp. 1–22, 2017.
[13] B.SriVarsha, P.S.Suryateja, "Using Advanced Encryption Standard for Secure and Scalable Sharing of personal Health Records in Cloud," International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5(6), 7745-7747, 2014.