An Investigation towards Security Threats for Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 6
Abstract
Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration, agility, scaling, 24x7 availability with immense opportunity for cost reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach. The information security in cloud, which is comprised of network security and data security as well, has become a major challenge for the cloud developers and providers because of the problem of hacking and attack vectors launched by malicious users or intruders. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. This paper focuses on several attack vectors commonly encountered in the particular area of cloud security making the technology vulnerable and unpopular. As nobody in the industries or academia is willing to compromise with privacy and security whatever advantageous the technology is, cloud computing, being a value added service, with all its virtue, is facing a great challenge to the cloud service providers and users.
Authors and Affiliations
Santanu Kumar Sen
PHASE NOISE EFFECTS AND ITS COMPUTATIONALLY EFFICIENT REDUCTION TECHNIQUE IN OFDM SYSTEM
Orthogonal frequency division multiplexing (OFDM) systems, is one of the future of high rate wireless communications, exhibit great sensitivity to the effects of phase noise and the time-varying propagation channe...
Based on Claim Verification Handling Flood Attacks in Disruption Tolerant Network
Disruption-Tolerant Networks (DTNs) deliver data to the collection of intermittently connected nodes. In traditional networks, malicious nodes within a DTN may try to attempt a data destruction or delay in transmi...
CHROMIUM DOPED POLYANILINE/MWCNTS NANOCOMPOSITE FOR SUPERCAPACITOR ELECTRODE MATERIALS
In this study we have prepared Cr-doped polyaniline/MWCNTs [Cr-PANI-CNT] nanocomposite by simple in-situ polymerization method where ammonium persulphate used as oxidant in HCl medium. The probable interaction be...
Analysis and Design of Earthquake Resistant Multi-Storied Braced R.C.C. Building using NISA Software
In the developing world, advanced building construction technology plays vital role. In the present work the construction of multistoried R.C.C. building with the help of NISA software to match the construction t...
A Study of Different Approaches for Information Extraction
Data mining is the term used to describe the process of extracting valuable information from a database. In this survey paper, we offer a revision of the Data Mining & its Uses and tools. This survey paper is...