Security Issues in Cloud Computing

Abstract

Sharing of resources like processing, data, services etc. through a web based delivery system constitutes the concept of a cloud based computing normally. The supplier presents all its resources via the web which may be accessed by the buyer on multiple devices and platforms on-demand. These will be simply provisioned as per demand with very little or no effort. Examples of cloud computing resources are Google Maps by Google, Amazon Web Services by Amazon and so on. Over the past few years, there has been an exponential growth within the field of cloud computing because the need for services on-the-go for mobile platforms has seen a speedy increase in demand. This successively has spurred the requirement for multiplied security measures for cloud computing. Security is the primary issue for cloud as well as other internet services. The primary reason preventative of a complete adoption of cloud computing is in truth the various security problems it comes with, despite however useful it's going to be. A number of these problems like knowledge breach, hacking, malware, DoS attacks are fairly acquainted and almost like the protection issues of a familiarweb services and systems. Whereas threats like abusing cloud services, APT parasites etc are specific to cloud computing. The end-user of cloud services can perpetually be troubled by the protection, vulnerabilities and convenience of their knowledge on cloud servers. The principal objective of this paper is to debate such threats and vulnerabilities in cloud computing. This study will modify customers, vendors as well as fellow researchers to have an insight regarding key issues associated with cloud security.

Authors and Affiliations

Sreejit Dutta

Keywords

Related Articles

Irredundant Complete Domination Number of Graphs

The concept of complete graphs with real life application was introduced in [17] .In [14] , A. Nellai Murugan et.al., was introduced the concept of complete dominating number of a graph. In this paper, We introduce a new...

Smart irrigation system with GSM module using DC-DC converter with Regenerative Snubber

To reduce the man power for irrigating the field. To minimize the wastage of water used for irrigation. To save the electricity cost by operating the water pumping motor by utilising solar power. At power supply unit, Z-...

Impact of ancient practices in modern society- A study report

Human civilization was boorish in earth around 5,000 BC, but social miseries are growing day by day. Matters of news papers and journals are indicating that gradually level of different kinds of negative behaviour are in...

Seismic Performance for Fixed Base and Base Isolated Reinforced Concrete Structure

The base isolation systems are gaining large attention as a mean to protect structure form seismic hazard. It is a suitable technology for earthquake resistant design of variety of structure like buildings, bridges, airp...

The Relationship between Intermediate EFL Learners’ Reading Comprehension Performance and their Test Anxiety and Lexical Knowledge

Reading Comprehension (RC) plays a significant role in any academic field, especially in TEFL. This study aimed to illuminate and investigate one psychological and crucial factor influencing RC performance: Test Anxiety...

Download PDF file
  • EP ID EP245193
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Sreejit Dutta (2016). Security Issues in Cloud Computing. International journal of Emerging Trends in Science and Technology, 3(11), 4747-4752. https://europub.co.uk/articles/-A-245193