An Investigation towards Security Threats for Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 6
Abstract
Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration, agility, scaling, 24x7 availability with immense opportunity for cost reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach. The information security in cloud, which is comprised of network security and data security as well, has become a major challenge for the cloud developers and providers because of the problem of hacking and attack vectors launched by malicious users or intruders. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. This paper focuses on several attack vectors commonly encountered in the particular area of cloud security making the technology vulnerable and unpopular. As nobody in the industries or academia is willing to compromise with privacy and security whatever advantageous the technology is, cloud computing, being a value added service, with all its virtue, is facing a great challenge to the cloud service providers and users.
Authors and Affiliations
Santanu Kumar Sen
Synthesis, Characterization and Dielectric Study of Polypyrrole/Sodium Metavanadate (Ceramic) Composites
In-situ polymerization of pyrrole (Py) was carried out with sodium metavanadate (ceramic) in the presence of oxidizing agent ammonium persulphate to synthesize polypyrrole (PPy)/sodium metavanadate (NaVO3) by che...
A REVIEW OF IMAGE WATERMARKING METHODS
Due to the recent progress in internet technology and evolution of very high speed networks operating everywhere, protection of digital content is must. So, it has become a tough task to protect copyright of an individua...
STUDY OF DIFFERENT ALGORITHMS USE FOR DISK SCHEDULING PROCESS
This paper aims to discuss the functioning of a disk and the comparative procedure involved in the retrieval of data on a direct access storage device by different algorithms. Efficiency of the different Disk Scheduling...
Dynamics Analysis of Two Storey Plane Rectangular Rigid Frame Subjected to Ground Motion
The dynamic analysis of plane rectangular rigid frame subjected to ground motion is presented. The matrix stiffness method, static condensation method, Szilard household characteristic equation method, Newton-Raph...
DESIGN AND FABRICATION OF FATIGUE ANALYSIS TEST SETUP FOR COMPOSITE MATERIAL TESTING
Lot of research work is published on various aspects of fatigue failure behavior of laminated composite materials. There is no standard method followed by researchers since these research works published in this a...