Hindrances in the Security of Cloud Computing

被引:0
|
作者
Nanda, Mehul
Tyagi, Aakarsh
Saxena, Karan
Chauhan, Neeru
机构
关键词
Cloud Attacks; Cloud Security; Data Loss; Cloud Misuse;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing model offers numerous advantages to the users such as flexibility, availability and less cost. This model is being adopted by large number of organizations and the list of organizations entering into Cloud Computing is growing on a large scale. The user places their data on Cloud as it provides a lot of storage area. But mounting of user data onto the Cloud demands protection of the data from malicious attacks. The Cloud providers provide various measures to protect the user data but still it is prone to attacks. This paper addresses the various security threats that might occur in Cloud Computing. A survey is being carried out to determine the awareness of these attacks among the various Cloud Computing users.
引用
收藏
页码:193 / 198
页数:6
相关论文
共 50 条
  • [41] Security Issues in Cloud Computing
    Borazjani, Parnian Najafi
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 800 - 811
  • [42] Improved Cloud Computing Security
    Hameed, Rasha Talal
    Hussain, Abdulatif Ali
    Mohamad, Omar Abdulwahabe
    Zidan, Khamis A.
    Hamid, Omar Talal
    Salman, Saba Abdulbaqi
    2018 1ST ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION AND SCIENCES (AICIS 2018), 2018, : 170 - 175
  • [43] Security in the Cloud Computing: A Review
    Nie, Xiao
    Suo, Hui
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2145 - 2149
  • [44] A note on cloud computing security
    Garg, Deepak
    Sidhu, Jagpreet
    Rani, Shalli
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 33 (03) : 133 - 154
  • [45] Security Architectures for Cloud Computing
    Okuhara, Masayuki
    Shiozaki, Tetsuo
    Suzuki, Takuya
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2010, 46 (04): : 397 - 402
  • [46] Security Algorithms for Cloud Computing
    Bhardwaj, Akashdeep
    Subrahmanyam, G. V. B.
    Avasthi, Vinay
    Sastry, Hanumat
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 535 - 542
  • [47] Review of cloud computing security
    School of Science and Technology, University of Science and Technology of China, Hefei, Anhui 230027, China
    Tien Tzu Hsueh Pao, 2013, 2 (371-381):
  • [48] Security Issues in Cloud Computing
    Sharma, Pardeep
    Sood, Sandeep K.
    Kaur, Sumeet
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 36 - +
  • [49] On Cloud Computing Security Issues
    Fauzi, Ainul Azila Che
    Noraziah, A.
    Herawan, Tutut
    Zin, Noriyani Mohd.
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT II, 2012, 7197 : 560 - 569
  • [50] Security Issues In Cloud Computing
    Ochani, Arti
    Dongre, Nilima
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 783 - 787