Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: Cloud computing is set of resources and services offered through the Internet. Cloud services aredelivered from data centers located throughout the world. Cloud computing facilitates its consumers byproviding virtual resources via internet. General example of cloud services is Google apps, provided by Googleand Microsoft SharePoint. The rapid growth in field of “cloud computing” also increases severe securityconcerns. This paper aims to identify security threats in cloud computing, which will enable both end users andvendors to know about the key security threats associated with cloud computing

Authors and Affiliations

Tayseer TagElsir Ahmed Osman, , Dr. Amin babiker A/Nabi Mustafa

Keywords

Related Articles

 Socio Media Connect: A Social Profile based P2P Network

 Abstract: It is observed that users tend to like and follow a particular type music/movies based on their socialinterests. Users like music of particular artists, album; movies/TV shows of a particular actor, direc...

 Implementation of Emotional Intelligence in a machine

 Abstract: This paper is an extended work of our paper “A New Concept on Thinking Machines: CyberPersonality” published in IJCS journal. Our previous work dealt with a new concept on implementing the entirepersonali...

 A Clustered Based Novel Approach of Graph Coloring

 Abstract: An efficient graph coloring algorithm is proposed in this research paper that uses less number of colors for a graph coloring problem. The proposed algorithm is applicable for all types of graph. The algo...

 Research on Clustering Method of Related Cases BasedOn Chinese Text

 Abstract: With the movement of population, crimes are showing mobility and professionalism characteristics,the cases which the same suspects committed have the same or similar characteristics, it is helpful to find...

 An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases

 Privacy Preserving Data Mining(PPDM) is a rising field of research in Data Mining and various approaches are being introduced by the researchers. One of the approaches is a sanitization process, that transform...

Download PDF file
  • EP ID EP89405
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Tayseer TagElsir Ahmed Osman, , Dr. Amin babiker A/Nabi Mustafa (2015).  Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view. IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 93-96. https://europub.co.uk/articles/-A-89405