An Investigation towards Security Threats for Cloud Computing

Abstract

Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration, agility, scaling, 24x7 availability with immense opportunity for cost reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach. The information security in cloud, which is comprised of network security and data security as well, has become a major challenge for the cloud developers and providers because of the problem of hacking and attack vectors launched by malicious users or intruders. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. This paper focuses on several attack vectors commonly encountered in the particular area of cloud security making the technology vulnerable and unpopular. As nobody in the industries or academia is willing to compromise with privacy and security whatever advantageous the technology is, cloud computing, being a value added service, with all its virtue, is facing a great challenge to the cloud service providers and users.

Authors and Affiliations

Santanu Kumar Sen

Keywords

Related Articles

 Evolution of Mobile Technology with 5 Generation

 Today, Computers play a vital role in science and business area and a one part of computer are network technology, change a human life wonderfully. Scientist innovates and developed some and to satisfy people’s d...

 AUTOMATION OF REST ENDPOINT OF CLUSTERED STORAGE SYSTEM

 Planning, designing, developing, testing and deployment are the different phases in software development life cycle. Manually testing the storage systems is a very tedious job. There is also high chance of missing...

 Performance Evaluation of Manually Operated Single Row Cotton Planter

 Cotton plays a major role in Indian economy and offers employment for more than 60 million people. The yield of cotton in Gujarat state about 758 lakh bales. In Gujarat the sowing of cotton is labour intensive as...

 ABNORMAL MOTION DETECTION FOR VIDEO SURVEILLANCE SYSTEM.

 There are many approaches for detecting abnormal behavior by monitoring moving objects such as human and a car etc. The place in abnormal behavior of the moving objects occurs is deduced from the position of the...

Hybrid Automatic Solar Tracking System for Different Types of Solar Cells: A review

The objective of this paper is to present review on the use of different material of Solar panel in a solar tracking system at Stationary, Single Axis, Dual Axis & Hybrid Axis solar tracker to have better performanc...

Download PDF file
  • EP ID EP148691
  • DOI -
  • Views 61
  • Downloads 0

How To Cite

Santanu Kumar Sen (30). An Investigation towards Security Threats for Cloud Computing. International Journal of Engineering Sciences & Research Technology, 2(6), 1479-1486. https://europub.co.uk/articles/-A-148691