An Investigation towards Security Threats for Cloud Computing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 6
Abstract
Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality to enhance collaboration, agility, scaling, 24x7 availability with immense opportunity for cost reduction through optimized and efficient computing. Its tremendous envision capability to cater components rapidly orchestrated, provisioned, implemented and decommissioned, scaling and on-demand utility-like model of allocation and consumption, is however, not free from some serious drawbacks due to its inherent security breach. The information security in cloud, which is comprised of network security and data security as well, has become a major challenge for the cloud developers and providers because of the problem of hacking and attack vectors launched by malicious users or intruders. A good number of attack vectors and threats have been identified responsible for the decline of the widespread of the cloud computing in the IT and ITes industries and a major thrust research area has been evolved in the current decade, particularly, to device and formalize the appropriate security metrics for the measurement of the impact of the varied attack vectors. This paper focuses on several attack vectors commonly encountered in the particular area of cloud security making the technology vulnerable and unpopular. As nobody in the industries or academia is willing to compromise with privacy and security whatever advantageous the technology is, cloud computing, being a value added service, with all its virtue, is facing a great challenge to the cloud service providers and users.
Authors and Affiliations
Santanu Kumar Sen
FLEXIBILITY OF EXISTING SUPD DESIGNS FOR IM PACT LOAD TESTING OF MOTORBIKES
This research work describes nature of under ride, the design and analysis of new guard or protection device for sides of heavy and medium goods vehicle .The newly designed guard is designed and tested according to th...
Cost Benefit Analysis of an Eco-Friendly Auditorium over a Normal Auditorium
With the advancement of green building movement in India, many companies have evinced keen interest in having a holistic green design and construction framework for upcoming multipurpose buildings. The booming na...
Human Identification Based On Scleral Vasculature
The blood vessel patterns of sclera show rich and unique details. To date, sclera is relatively less studied and little is known regarding its usefulness and performance. Here, sclera recognition for human identif...
Solitude Preservative Public Auditing With Access and Permission Control for Confidential Cloud Storage
In this paper, we suggest a privacy-preserving public auditing system for data storage safety in cloud computing. Using cloud storage, users can tenuously store their data and enjoy the on-demand high-quality app...
AN EXPERIMENTAL STUDY ON RC CONTINUOUS BEAM STRENGTHENED BY USING FRP SHEET
Strengthening structures using external bonding of advanced fiber reinforced polymer (FRP) composite is in its advent around the world from the past decade for it is more economically and technically effective and...