SAAS Cloud security : Attacks and Proposed Solutions
Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2017, Vol 5, Issue 4
Abstract
Nowadays the Cloud has started to gain ground even in SMEs, in spite of that the Cloud is still unknown for several ... for others few reliable. SaaS represents a promising technology, which grows each year rapidly. Only at the security level, there are many obstacles, and becomes a major problem against its adoption. For example the public cloud represents a huge risk since the data of several companies are stored at the same place, close to each other. For this reason the security of transiting or stored data in the SaaS remains a challenge for providers in order to gain the confidence of the customers. SAAS remains the target of several attacks, such as network attacks, etc., which aim to disrupt its operation. Therefore, it is essential to deal with these attacks, and tried to minimize vulnerability and adopt new security concepts. Through this document, we are going to study the security of SaaS, We will try to find the burly and feeble points of the most famous clouds such as Google Amazon, Microsoft, and come out with Countermeasures and proposals solution.
Authors and Affiliations
Sail Soufiane, Bouden Halima
Absorption Spectra Analysis using Modified Self-Organizing Feature Maps
This research demonstrates an application of a modified self-organizing feature map (SOFM) algorithm to analyze and discover the quality of chemical absorption spectrum data. By forming an NxN neural array from input fea...
MEC towards 5G: A Survey of Concepts, use Cases, Location Tradeoffs
In recent years, there has been a new trend to push everything to a centralized cloud, triggered by virtualization and pushed by the need to reduce costs and increase suppleness. In the process, mobile operators and indu...
Pattern Based Melody Matching Approach to Music Information Retrieval
Digitization of music and advancements in information technology for sharing information on World Wide Web paved way for its availability in enormous quantities anywhere any time. Rather than retrieving annotated music i...
Hello Message Scheme Enhancement in MANET based on Neighbor Mobility
The key idea behind the routing protocols based in multi hope is to find the required path from the source node to the destination. Since those protocols does not consider the node mobility in their mechanism, we propose...
Simulation of the Charge Motion near the Velocity of Light in Electric and Magnetic Fields
A numerical simulation method for the charge motion near the velocity of light in electric and magnetic fields has been investigated using the relativistic mass by Einstein’s special theory of relativity, and an electron...