Open Access   Article Go Back

Threats and Vulnerabilities of Cloud Computing: A Review

P.S. Suryateja1

  1. CSE Dept., Vishnu Institute of Technology, Bhimavaram, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 297-302, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.297302

Online published on Mar 30, 2018

Copyright © P.S. Suryateja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.S. Suryateja, “Threats and Vulnerabilities of Cloud Computing: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.297-302, 2018.

MLA Style Citation: P.S. Suryateja "Threats and Vulnerabilities of Cloud Computing: A Review." International Journal of Computer Sciences and Engineering 6.3 (2018): 297-302.

APA Style Citation: P.S. Suryateja, (2018). Threats and Vulnerabilities of Cloud Computing: A Review. International Journal of Computer Sciences and Engineering, 6(3), 297-302.

BibTex Style Citation:
@article{Suryateja_2018,
author = {P.S. Suryateja},
title = {Threats and Vulnerabilities of Cloud Computing: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {297-302},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1799},
doi = {https://doi.org/10.26438/ijcse/v6i3.297302}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.297302}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1799
TI - Threats and Vulnerabilities of Cloud Computing: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - P.S. Suryateja
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 297-302
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1550 605 downloads 286 downloads
  
  
           

Abstract

Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-use model for billing customers and providing other features like elasticity, ubiquity, scalability, and availability of resources for businesses. Cloud computing provides delivery models like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) which can be utilized by various organizations to solve their data storage and processing needs. From recent surveys conducted by well known reputed cloud providers, it is apparent that more and more organizations and enterprises are moving their workloads to cloud. The top concern among the organizations to move their workloads or processes to cloud is security. Even though the security measures provided in cloud computing are evolving over the years, it still remains as a major challenge or obstacle. This paper provides an overview of numerous threats and vulnerabilities of cloud computing which can act as a guide to decision makers in organizations to evaluate the security in clouds.

Key-Words / Index Term

Cloud Computing, Cloud Security, Cloud Threats, Cloud Vulnerabilities

References

[1] K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013.
[2] P. S. Suryateja, "A Comparative Analysis of Cloud Simulators," Int. J. Mod. Educ. Comput. Sci., vol. 8, no. 4, pp. 64–71, 2016.
[3] Tripwire Top Cloud Security Threats - https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/ (last accessed on Mar, 2018)
[4] CSOonline Top Cloud Security Threats 2018 - https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html (last accessed on Mar, 2018)
[5] Comparethecloud 8 Public Cloud Security Threats - https://www.comparethecloud.net/articles/8-public-cloud-security-threats-to-enterprises-in-2017/ (last accessed on Mar, 2018)
[6] Tierpoint Top 5 Cloud Data Security Threats - https://www.tierpoint.com/top-5-cloud-data-security-threats-in-2018/ (last accessed on Mar, 2018)
[7] Techtarget Five Cloud Security Threats to Combat in 2018 - http://searchcloudcomputing.techtarget.com/tip/Five-cloud-security-threats-to-combat-in-2018 (last accessed on Mar, 2018)
[8] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013
[9] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013
[10] N. Khan and A. Al-yasiri, "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework," Procedia - Procedia Comput. Sci., vol. 94, pp. 485–490, 2016.
[11] G. Somani, M. Singh, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing : Issues , taxonomy , and future directions," Comput. Commun., vol. 107, pp. 30–48, 2017.
[12] B. Varghese and R. Buyya, "Next Generation Cloud Computing: New Trends and Research Directions," vol. 2017, no. September, pp. 1–22, 2017.
[13] B.SriVarsha, P.S.Suryateja, "Using Advanced Encryption Standard for Secure and Scalable Sharing of personal Health Records in Cloud," International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5(6), 7745-7747, 2014.