Survey on Security Vulnerabilities in Cloud Computing Environment

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4

Abstract

Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. Cloud services are becoming an essential part of many organizations. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these datacenter’s may be located in any part of the world beyond the reach and control of users, there are multifarioussecurity and privacy challenges that need to be understood and addressed. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish- mash ofsecurity and privacy controls. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing environment.

Authors and Affiliations

Sudha Ashok k

Keywords

Related Articles

Research on Industrial Robot Teaching Pendant based on Android and its Realization

Abstract: As the current industrial robots teaching systems have some disadvantages including high maintenance cost, poor portability and operational complexity, an industrial robot teaching system based on Android platf...

 A review of High Performance Computing

 Current high performance computing (HPC) applications are found in many consumers, industrial and research fields. There is a great deal more to remote sensing data than meets the eye, and extracting that inform...

 A Review on Resource Discovery Strategies in Grid Computing

 Abstract : Technological, Finance, Scientific, engineering and other applications and in specific grandchallenge applications are becoming ever more demanding in terms of their computing requirements.Gradually, all...

 A Modified Algorithmic Approach of DSDV Routing Protocol for Wireless Ad Hoc Network

 An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. A Mobile Ad hoc NETwork called MANET is a kind of wireless ad-h...

 Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback

 A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engine...

Download PDF file
  • EP ID EP138863
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Sudha Ashok k (2016). Survey on Security Vulnerabilities in Cloud Computing Environment. IOSR Journals (IOSR Journal of Computer Engineering), 18(4), 54-56. https://europub.co.uk/articles/-A-138863