An Investigation towards Security Threats for Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 6
Abstract
Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration, agility, scaling, 24x7 availability with immense opportunity for cost reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach. The information security in cloud, which is comprised of network security and data security as well, has become a major challenge for the cloud developers and providers because of the problem of hacking and attack vectors launched by malicious users or intruders. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. This paper focuses on several attack vectors commonly encountered in the particular area of cloud security making the technology vulnerable and unpopular. As nobody in the industries or academia is willing to compromise with privacy and security whatever advantageous the technology is, cloud computing, being a value added service, with all its virtue, is facing a great challenge to the cloud service providers and users.
Authors and Affiliations
Santanu Kumar Sen
MOTOR LUBRICANT OIL DURATION RATE MODELING
The paper is trying to give information about motor lubricant oil its grades according to relatively international standard. The paper suggested that due to poor oil personnel experience in Sudan lubricant oil choo...
EFFECT OF CONCENTRATION OF OCIMUM SACTUM Linn (TULSI) LEAVES EXTRACT ON THE MICROORGANISM GROWTH
the world for natural medicines. Tulsi is known as “Queen of plants” and “The mother medicine of nature”. Ocimum sanctum has number of chemical compounds (beta carotene, calcium, vitamin C, estragol, lina chavicol and...
EXPERIMENTAL STUDY ON UTILIZATION OF WASTE PLASTIC AS AGGREGATE IN CEMENT MORTAR
Solid waste management is one of the major environmental concerns in our country now a days. The present study covers the use or recycled plastics as replacement of coarse aggregates in concrete. The main aim of the stud...
Immobilized Bioreactors for the Treatment of Industrial Wastewater – A Comparative Study
The various sources of incidence of various pollutants from major chemical process industries and their dangerous effects have been reported. The various characteristic composition of wastewater from different sources...
An Efficient Pricing Mechanism for Mobile Video Streaming in Cloud Computing
Among the most popular consumer devices, the mobile phones are the one whose usage has increased in a rapid manner and along with the development of 3G networks and smart phones, enabled users to use them in an e...