A review on Cloud Computing Security issues and Threat

Abstract

Cloud computing is a combination of traditional technology of computing and various other technologies such as parallel computing, distributed computing etc. The major goal is to achieve a complete system having capabilities of computing by providing low cost computing environment. Different organizations get virtual space to deploy applications or run operations over it. Various services of cloud are given by some third party who possesses the arrangement. As this environment is totally based on third party so its difficult to maintain data security, confidentiality, availability of resources, so if in any case some live attack occurs like DDoS attack, then it is very difficult to cope up. In this research we are going to discuss various types of vulnerabilities and threats to cloud computing environment, also the methods to mitigate those security issues.

Authors and Affiliations

Dheeraj Pal, Divya Gautam

Keywords

Related Articles

A Review for Removal of Baseline Wander Noise in ECG Using Various Techniques

The electrocardiogram (ECG) is the powerful non-invasive tool used for diagnosis of a large number of heart related problems. The electrocardiogram signals are usually contaminated by different noises from the large num...

Security Problems and Their Defenses in TCP/IP Protocol Suite

The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an...

Comparison Of Various Kernels Of Support Vector Machine

As we know, classification plays an important role in every field. Support vector machine is the popular algorithm for classification and prediction. For classification and prediction by support vector machine, LIBSVM i...

Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network

Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although the identity of a node can be verified through cryptographic authentication, conventiona...

Review of A New Approach for Hybrid Technology Monitoring and Logger System for Electricity

In India total electricity generation has depends upon the water. So, 60% or 70% water is used for electricity generation from dam; hence, shortage of water is take place for drinking & farming. To reduce the generation...

Download PDF file
  • EP ID EP22561
  • DOI -
  • Views 212
  • Downloads 5

How To Cite

Dheeraj Pal, Divya Gautam (2016). A review on Cloud Computing Security issues and Threat. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(8), -. https://europub.co.uk/articles/-A-22561