Sie sind auf Seite 1von 4

Approach Method used Limitations/issues year Benefits/solutions Goal to be

name purposed achieved


Privacy issues RELATED Privacy issues 2012 Provide trust on To reduce the
RESEARCH IN data privacy threats to
TRUST privacy
data security; systematic Cloud computing 2014 To monitor the Minimize the
literature data security; security of Cloud threats which
review example , Security Alliance can create
shortly SLR Account or (CSA) is formed problems in
service hijacking cloud
etc computing
security
Attacks on Different types of 2016 must ensure To avoid from
cloud attacks on cloud strong these attacks
accounts authentication different
and validation steps has to
policies be taken
Attacks and No method is Data integrity 2014 No solution Provide
data integrity used in the and Reliability purposed security from
issues paper issues, attacks and
Session Hijacking privacy issues
Network and No method is storage and 2015 Cloud Security Network and
virtualization used computing Alliance (CSA) virtualization
security security issues, security
access security minimization
issues, trust
security issues,
Data File Online Cyber 2013 File Allocation Many types of
Breacher, Allocation Theft Table (FAT) security
Malicious Table (FAT) system issues will be
Insider system architecture can solved
architecture minimize these
issues
Security and the Cloud Security and 2013 the Cloud service These issues
privacy service privacy problems providers (CSPs) can be
concerns providers should take more minimized by
(CSPs) responsibility securing data
Data Issues Different Infected 2013 Security check Make cloud
Privacy issues method is Application events: resource fully secure
Infected used for Security issues isolation and reliable
Application different
Security issues
issues
There are a number of types of security ,privacy ,issues and attacks which can creates problems some of
those are listed below

In cloud computing paradigm, a cloud provider creates, deploys and manages the resources,
application and services. Major types of security threats in the context of cloud are
Confidentiality, Authentication ,Integrity, Non-repudiation, Domain Name System (DNS) Attack,
DDoS Attacks, Port Scanning Attacks, Attack on Virtualization, Net Sniffers , SQL Injection Attack.,
Abuse And Nefarious Use Of Cloud Computing, Session Hijacking are the threat attacks , Online
Cyber Theft, Data Breachers,
Malicious Insider, Wrapping Attack and many other attacks
To understand the need to keep the cloud secure, the not-profit organization is led by a broad
coalition of industry practitioners, corporations, associations and other key stakeholder’s Cloud
Security Alliance (CSA) is formed with a mission to promote the use of the best practices for
providing security assurance within cloud computing,
The method, systematic literature review shortly SLR has been used
Understanding the risks of the security and privacy in the cloud computing environment and
developing efficient and effective solutions for it is really a difficult task. Confidentiality, integrity,
reliability and availability are widely used terminology for security issues in cloud computing
environment means that the user data in the cloud should remain confidential and protected
from unauthorized access,
The malware injection attack has become a major security concern in cloud computing systems.
It can be prevented by using File Allocation Table (FAT) system architecture
 References
 [2] National Institute of Standards and Technology, NIST Definition of Cloud Computing,
Sept 2011. [3] Cloud Security Alliance. Security guidance for critical areas of focus in cloud
computing (v2.1). Decemeber,2009.
Eystein Mathisen, “Security Challenges and Solutions in Cloud Computing”, 5th IEEE
International Conferenceon Digital Ecosystems and Technologies (IEEE DEST 2011), 2011.
 T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE
International Conference on Advanced Information Networking and Applications(AINA),
pp. 27-33, DOI= 20-23 April 2010
Santosh Kumar and R. H. Goudar
J.Viega, “Cloud Computing and the Common Man”, IEEE Computer Society,
Volume 42, Issue 8, Pages 106-108, August 2009.
 Security and Privacy Issues in Cloud Computing
 National Institute of standard and technology (NIST), “The NIST definition of cloud
computing”, http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf. Sep.
2011. [2] Z. Xiao, Y. Xiao, “Security and privacy in Cloud Computing”, IEEE Communication
Surveys and Tutorials, pp. 843-859, 2013.
 e
 D. Gil and I.-Y. Song, “Modeling and Management of Big Data: Challenges and
opportunities,” Futur. Gener.
 Comput. Syst., vol. 63, pp. 96–99, Oct. 2016.
 DataLossDB Open Security Foundation. http://datalossdb.org/statistics 2. Sophos
Security Threat Report 2012. http://www.sophos.com/
 A comparative study of major service providers for cloud computing
 Reviews on Security Issues and Challenges in Cloud Computing
 Y Z An, Z F Zaaba & N F Samsudin School of Computer Sciences, Universities Sains
Malaysia, 11800 Minden, Pulau Pinang, Malaysia
 Security, Privacy and Challenges in Mobile Cloud Computing (MCC):- A Critical Study and
Comparison Nirbhay K. Chaubey1, Darshan M. Tank2
 Security Issues with Possible Solutions in Cloud Computing-A Survey Abhinay B.Angadi,
Karuna C.Gull
 L. Wang, G. Laszewski, M. Kunze and J. Tao, “Cloud computing: a perspective study”, J
New Generation Computing, 2010, pp 1-11.
 [2] Harjit Singh Lamba and Gurdev Singh, “Cloud Computing-Future Framework for
emanagement of NGO's”, IJoAT, ISSN 0976-4860, Vol 2, No 3, Department Of Computer
Science, Eternal University, Baru Sahib, HP, India, July 2011.
 [3] Peter Mell, and Tim Grance, "The NIST Definition of Cloud
Computing,"2009,http://www.wheresmyserver.co.nz/storage/ media
 A REVIEW ON VARIOUS DATA SECURITY ISSUES IN CLOUD COMPUTING ENVIRONMENT
AND ITS SOLUTIONS Balasubramanian V and Mala T

NAME ROLL NUMBER SECTION


ALLAH RAKHA BCSM-F16-481 7A
FAISAL MAHMMOD BCSM-F16-482 7A
HAMID RAZA BCSM-F16-478 7A

Das könnte Ihnen auch gefallen