Security Issues in Cloud Computing

Abstract

Sharing of resources like processing, data, services etc. through a web based delivery system constitutes the concept of a cloud based computing normally. The supplier presents all its resources via the web which may be accessed by the buyer on multiple devices and platforms on-demand. These will be simply provisioned as per demand with very little or no effort. Examples of cloud computing resources are Google Maps by Google, Amazon Web Services by Amazon and so on. Over the past few years, there has been an exponential growth within the field of cloud computing because the need for services on-the-go for mobile platforms has seen a speedy increase in demand. This successively has spurred the requirement for multiplied security measures for cloud computing. Security is the primary issue for cloud as well as other internet services. The primary reason preventative of a complete adoption of cloud computing is in truth the various security problems it comes with, despite however useful it's going to be. A number of these problems like knowledge breach, hacking, malware, DoS attacks are fairly acquainted and almost like the protection issues of a familiarweb services and systems. Whereas threats like abusing cloud services, APT parasites etc are specific to cloud computing. The end-user of cloud services can perpetually be troubled by the protection, vulnerabilities and convenience of their knowledge on cloud servers. The principal objective of this paper is to debate such threats and vulnerabilities in cloud computing. This study will modify customers, vendors as well as fellow researchers to have an insight regarding key issues associated with cloud security.

Authors and Affiliations

Sreejit Dutta

Keywords

Related Articles

Introduction to Image Registration in Remote Sensing using Matlab

Image registration is used as a preliminary step in other image processing applications. It is difficult to find an accurate, robust, and automatic image registration method, and most existing image registration methods...

Evidence Based Psychosocial Intervention

In recent years, there has been significant progress and expansion on the development of evidence-based psychosocial treatments for substance abuse and dependence. A literature review was undertaken using the several ele...

Wind Power Generation System Using Railway – A Prototype Model

Since the conventional power generation involved natural resource which are depleting day by day, the use of non-conventional source can be a better alternative in generation of electricity. Wind power is a major source...

Stabilization of Soft Subgrade Soil with Non-Woven Coir Geotextiles

In this work, the possibility of using non woven coir geotextile in soft subgrade soil was investigated. Flexible pavement have mostly problems like formation of potholes, ruts, cracks and localized depression and settle...

An Influential Algorithm for Outlier Detection

The Subject of Data Mining, which is very vast in the direction of data analyzing , data preprocessing, data extracting, knowledge data discovery, extracting hidden data and many more. Here we discuss one of the parts of...

Download PDF file
  • EP ID EP245193
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Sreejit Dutta (2016). Security Issues in Cloud Computing. International journal of Emerging Trends in Science and Technology, 3(11), 4747-4752. https://europub.co.uk/articles/-A-245193