A review on Cloud Computing Security issues and Threat

Abstract

Cloud computing is a combination of traditional technology of computing and various other technologies such as parallel computing, distributed computing etc. The major goal is to achieve a complete system having capabilities of computing by providing low cost computing environment. Different organizations get virtual space to deploy applications or run operations over it. Various services of cloud are given by some third party who possesses the arrangement. As this environment is totally based on third party so its difficult to maintain data security, confidentiality, availability of resources, so if in any case some live attack occurs like DDoS attack, then it is very difficult to cope up. In this research we are going to discuss various types of vulnerabilities and threats to cloud computing environment, also the methods to mitigate those security issues.

Authors and Affiliations

Dheeraj Pal, Divya Gautam

Keywords

Related Articles

Mechanical Properties Assessment of Ultra High Performance Fibre Reinforced Concrete (UHPFRC)

The present paper is aimed to assessment of UHPFRC the conventional concrete is replaced by UHPFRC, an Advanced Cement based Super plasticised concrete with high workability and low water cement ratio. The constituents...

slugAn Approach towards Link Positions Routing In Wireless Network

Here, we account for the fact that MAC protocols incorporate a finite number of transmission attempts per packet. The performance of a path depends not only on the number of the links on the path and the quality of its l...

FPGA Implementation of Efficient Face Detector for Very Low Resolution Images

Face detection is identifying or verifying the face from the input image. Face detection and tracking has been an active research area for a long time because it is the initial and important step in many different appli...

A Review to Vho for Wimax and Wifi Networks

In the heterogeneity environment, Wireless telecommunications techniques is defined in terms of two different networks, WiMax and WiFi, which uses number of transmission methods such as portable or fully mobile interne...

Brainwave and Alcohol Sensitising Helmet for Riders Safety

Two wheelers are widely used than other form of vehicles due to its low cost and simplicity. Most of the time rider doesn’t like to wear helmet which could be result in fatal accidents. Drunken driving and Drowsy drivin...

Download PDF file
  • EP ID EP22561
  • DOI -
  • Views 245
  • Downloads 5

How To Cite

Dheeraj Pal, Divya Gautam (2016). A review on Cloud Computing Security issues and Threat. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(8), -. https://www.europub.co.uk/articles/-A-22561