An Analysis of Security Challenges in Cloud Computing

被引:2
|
作者
Parekh, Disha H. [1 ]
Sridaran, R. [1 ]
机构
[1] Marwadi Educ Fdn Grp Inst, Fac Comp Applicat, Rajkot, Gujarat, India
关键词
Security threats; SQL Injection; Malevolent users; Browser Security; Malicious Attacks; Data Leakage;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss of sensitive data, data leakage and few others related to cloning, resource pooling and so on. As far as security issues are concerned, a very wide study has been reviewed which signifies threats with service and deployment models of cloud. In order to comprehend these threats, this study is presented so as to effectively refine the crude security issues under various areas of cloud. This study also aims at revealing different security threats under the cloud models as well as network concerns to stagnate the threats within cloud, facilitating researchers, cloud providers and end users for noteworthy analysis of threats.
引用
收藏
页码:38 / 46
页数:9
相关论文
共 50 条
  • [1] Cloud computing : security challenges
    Bouayad, Anas
    Blilat, Asmae
    el Houda Mejhed, Nour
    El Ghazi, Mohammed
    [J]. 2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST'12), 2012, : 26 - 31
  • [2] Challenges and Security in Cloud Computing
    Chang, Hyokyung
    Choi, Euiin
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 214 - 217
  • [3] Cloud Computing and Security Challenges
    Yu, Huiming
    Powell, Nakia
    Stembridge, Dexter
    Yuan, Xiaohong
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [4] Cloud Computing Security Analysis: Challenges and Possible Solutions
    Prakash, Chandan
    Dasgupta, Surajit
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 54 - 57
  • [5] Security Challenges and Analysis of Various Security Models for Cloud Computing Infrastructure
    Madhavan, P.
    Ravikumar, G.
    Ghosh, Shuvajyoti
    Shaw, Bernard
    Mondal, Arghadeep
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 14 - 18
  • [6] A Survey of Security Challenges in Cloud Computing
    El Moctar, Cheikh Brahim Ould Mohamed
    Konate, Karim
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 843 - 849
  • [7] Security Challenges in Vehicular Cloud Computing
    Yan, Gongjun
    Wen, Ding
    Olariu, Stephan
    Weigle, Michele C.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 284 - 294
  • [8] The Security Challenges in Healthcare Cloud Computing
    Alsuwaidani, Talal
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 731 - 737
  • [9] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [10] Security challenges in the distributed cloud computing
    Nwobodo, Ikechukwu
    Jahankhani, Hossein
    Edoh, Aloysius
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 38 - 51