Beruflich Dokumente
Kultur Dokumente
In cloud computing paradigm, a cloud provider creates, deploys and manages the resources,
application and services. Major types of security threats in the context of cloud are
Confidentiality, Authentication ,Integrity, Non-repudiation, Domain Name System (DNS) Attack,
DDoS Attacks, Port Scanning Attacks, Attack on Virtualization, Net Sniffers , SQL Injection Attack.,
Abuse And Nefarious Use Of Cloud Computing, Session Hijacking are the threat attacks , Online
Cyber Theft, Data Breachers,
Malicious Insider, Wrapping Attack and many other attacks
To understand the need to keep the cloud secure, the not-profit organization is led by a broad
coalition of industry practitioners, corporations, associations and other key stakeholder’s Cloud
Security Alliance (CSA) is formed with a mission to promote the use of the best practices for
providing security assurance within cloud computing,
The method, systematic literature review shortly SLR has been used
Understanding the risks of the security and privacy in the cloud computing environment and
developing efficient and effective solutions for it is really a difficult task. Confidentiality, integrity,
reliability and availability are widely used terminology for security issues in cloud computing
environment means that the user data in the cloud should remain confidential and protected
from unauthorized access,
The malware injection attack has become a major security concern in cloud computing systems.
It can be prevented by using File Allocation Table (FAT) system architecture
References
[2] National Institute of Standards and Technology, NIST Definition of Cloud Computing,
Sept 2011. [3] Cloud Security Alliance. Security guidance for critical areas of focus in cloud
computing (v2.1). Decemeber,2009.
Eystein Mathisen, “Security Challenges and Solutions in Cloud Computing”, 5th IEEE
International Conferenceon Digital Ecosystems and Technologies (IEEE DEST 2011), 2011.
T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE
International Conference on Advanced Information Networking and Applications(AINA),
pp. 27-33, DOI= 20-23 April 2010
Santosh Kumar and R. H. Goudar
J.Viega, “Cloud Computing and the Common Man”, IEEE Computer Society,
Volume 42, Issue 8, Pages 106-108, August 2009.
Security and Privacy Issues in Cloud Computing
National Institute of standard and technology (NIST), “The NIST definition of cloud
computing”, http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf. Sep.
2011. [2] Z. Xiao, Y. Xiao, “Security and privacy in Cloud Computing”, IEEE Communication
Surveys and Tutorials, pp. 843-859, 2013.
e
D. Gil and I.-Y. Song, “Modeling and Management of Big Data: Challenges and
opportunities,” Futur. Gener.
Comput. Syst., vol. 63, pp. 96–99, Oct. 2016.
DataLossDB Open Security Foundation. http://datalossdb.org/statistics 2. Sophos
Security Threat Report 2012. http://www.sophos.com/
A comparative study of major service providers for cloud computing
Reviews on Security Issues and Challenges in Cloud Computing
Y Z An, Z F Zaaba & N F Samsudin School of Computer Sciences, Universities Sains
Malaysia, 11800 Minden, Pulau Pinang, Malaysia
Security, Privacy and Challenges in Mobile Cloud Computing (MCC):- A Critical Study and
Comparison Nirbhay K. Chaubey1, Darshan M. Tank2
Security Issues with Possible Solutions in Cloud Computing-A Survey Abhinay B.Angadi,
Karuna C.Gull
L. Wang, G. Laszewski, M. Kunze and J. Tao, “Cloud computing: a perspective study”, J
New Generation Computing, 2010, pp 1-11.
[2] Harjit Singh Lamba and Gurdev Singh, “Cloud Computing-Future Framework for
emanagement of NGO's”, IJoAT, ISSN 0976-4860, Vol 2, No 3, Department Of Computer
Science, Eternal University, Baru Sahib, HP, India, July 2011.
[3] Peter Mell, and Tim Grance, "The NIST Definition of Cloud
Computing,"2009,http://www.wheresmyserver.co.nz/storage/ media
A REVIEW ON VARIOUS DATA SECURITY ISSUES IN CLOUD COMPUTING ENVIRONMENT
AND ITS SOLUTIONS Balasubramanian V and Mala T