Open Access   Article Go Back

A Survey on Security Threats and Attacks in Cloud Computing

V.P.Muthukumar 1 , R.Saranya 2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-11 , Page no. 120-125, Nov-2014

Online published on Nov 30, 2014

Copyright © V.P.Muthukumar , R.Saranya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V.P.Muthukumar , R.Saranya, “A Survey on Security Threats and Attacks in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.120-125, 2014.

MLA Style Citation: V.P.Muthukumar , R.Saranya "A Survey on Security Threats and Attacks in Cloud Computing." International Journal of Computer Sciences and Engineering 2.11 (2014): 120-125.

APA Style Citation: V.P.Muthukumar , R.Saranya, (2014). A Survey on Security Threats and Attacks in Cloud Computing. International Journal of Computer Sciences and Engineering, 2(11), 120-125.

BibTex Style Citation:
@article{_2014,
author = {V.P.Muthukumar , R.Saranya},
title = {A Survey on Security Threats and Attacks in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2014},
volume = {2},
Issue = {11},
month = {11},
year = {2014},
issn = {2347-2693},
pages = {120-125},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=315},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=315
TI - A Survey on Security Threats and Attacks in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - V.P.Muthukumar , R.Saranya
PY - 2014
DA - 2014/11/30
PB - IJCSE, Indore, INDIA
SP - 120-125
IS - 11
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3566 3322 downloads 3541 downloads
  
  
           

Abstract

Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security threats and Technical Components of Cloud Computing.

Key-Words / Index Term

Cloud Computing, Security, Threats, attacks, Cloud Service Provider

References

[1]. S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.
[2]. J Brodkin. (2008). Gartner Seven cloud-computing security risks. Available: http://www.networkworld.com/news/200S!07020Scloud. Html
[3]. D. L. Ponemon, "Security of Cloud Computing Users," 2010.
[4]. S. K. Tim Mather, and Shahed Latif, Cloud Security and Privacy: O'Reilly Media, Inc , 2009.
[5]. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.
[6]. http://cloudsecurity.trendmicro.com/
[7]. N. Mead, et ai, "Security quality requirements engineering (SQUARE) methodolgy," Carnegie Mellon Software Engineering Institute.
[8]. J. W.Rittinghouse and J. F.Ransome, Cloud Computing: Taylor and Francis Group, LLC, 2010.
[9]. T. Mather. (2011). Data Leakage Prevention and Cloud Computing. Available: http://www.kpmg.com/Globa1/Pages/default.aspx.

[10]. P. Coffee, "Cloud Computing: More Than a Virtual Stack," ed: salesforce.com. [II] z. Zorz, "Top 7 threats to cloud computing," 2010.
[11]. Security Management in the Cloud. Available http://mscerts.net/programming/Security%20Management%20in%20t he%20Cloud.aspx
[12]. (2010). Security Management in the Cloud – Access Control.
[13]. P. Sefton, "Privacy and data control in the era of cloud computing.