A Survey on Security Issues and Vulnerabilities on Cloud Computing

Abstract

Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization basis. Several companies have already built Internet consumer services such as search engine, use of some websites to communicate with other user in websites, E-mail services, and services to purchase items online that use cloud computing infrastructure.However this technology suffers from threats and vulnerabilities that prevent the users from trusting it. The occurrence of these threats may result into damaging of confidential data in cloud environment. This survey paper aims to analyze the various unresolved security threats in cloud computing which are affecting the various stake-holders linked to it. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security and so on.

Authors and Affiliations

K. L. NEELA , Dr. V. KAVITHA

Keywords

Related Articles

Modified 4-Bit Comparator Using Sleep Technique

The development of digital integrated circuits is challenged by higher power consumption. So low power circuits have become a top priority in modern VLSI design. This paper presents layout simulations of a new improved f...

A Dymamic Service Composition on Social Networks

In today’s world, web services are highly essential as they are required for accomplishing tasks in a matter of second. Web services provide features such as e-Booking, e-Shopping, e-Banking that helps users to acquire e...

A Survey on Under Water Images Enhancement Techniques 

The Major causes for the underwater images are light scattering and color change. One of the methods of improving quality of the image is image enhancement. This paper presents a comparative study of various image enhanc...

Feature - based Automated Aerial Image to Satellite Image Registration

Image processing is required in number of fields like clinical diagnosis, remote sensing and computer vision. The need for overlaying of images exists in image processing. Image registration is the basis step in various...

CHEQUE CLEARANCE SYSTEM USING VARIOUS VALIDATION TECHNIQUES

Processing cheques manually is been done for decades and more efficient systems are still under research. In this entire processing system, providing a secured transaction with efficient verification is what more importa...

Download PDF file
  • EP ID EP156781
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

K. L. NEELA, Dr. V. KAVITHA (2013). A Survey on Security Issues and Vulnerabilities on Cloud Computing. International Journal of Computer Science & Engineering Technology, 4(7), 855-860. https://europub.co.uk/articles/-A-156781