Security Threats to Cloud and Corresponding Solutions

D. Raghavaraju*
*Assistant Professor, Department of Computer Science and Engineering, SVIT, Anantapur, India.
Periodicity:February - April'2016

Abstract

Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements.

Keywords

Cloud Computing, Security, Attacks, Distributed Computing

How to Cite this Article?

Raghavaraju, D. (2016). Security Threats to Cloud and Corresponding Solutions. i-manager’s Journal on Cloud Computing,3(2), 32-36.

References

[1]. Ratansingham, P., and Kumer, K., (2000). “Trading partner trust in electronic commerce participation”. In: nd Proceeding of the 22 International Conference on Information Systems, pp. 544–552.
[2]. Kim, K.K., Lee, J.W., and Kim, H.S., (2003). “Impact of trust and risk on internet banking adoption”. Korean Manag. Rev., Vol. 32, No. 6, pp.1771–1797.
[3]. Jarvenpaa, S.L., Knoll, K., and Leidner, D.E., (2003). “Is anybody out there? Antecedents of trust in global virtual teams”. J. Manag. Inf. Syst., Vol. 14, No. 4, pp. 29–64.
[4]. Lim, N., (2003). “Consumer's Perceived Risk: Sources versus Consequences”. Electron. Commer. Res. Appl., Vol. 2, No. 3, pp. 216–228.
[5]. Ahn, J.H., Choi, K.C., Sung, K.M., and Lee, J.H. “A study on the impact of security risk on the usage of knowledge management system: focus on parameter of trust”. In: International Conference on Information systems, Vol. 15.
[6]. Hexin, Y., and Ahn, J.C., (2014). “An empirical analysis on the persistent usage of personal cloud service: a cast study of China”. Proc. Korean Soc. Internet Inf. Conf., Vol. 15, No. 2, pp. 149–150.
[7]. Jun, C.J., Lee, J.H., and Jeon, I.S., (2014). “Research about factor affecting the continuous use of cloud storage service: User factor, system factor, psychological switching cost factor”. J. Soc. e-Bus. Stud., Vol. 19, No. 1, pp. 15–42.
[8]. Seo, K.K., (2013). “Factor analysis of the cloud service adoption intension of Korean firms: Applying the TAM and VAM”. J. Digit Policy Manag, Vol. 11, No. 12, pp. 155–160.
[9]. Park, C.S., (2011). “Study on security considerations in the cloud computing”. J Korea Acad.-Ind. Co-op. Soc. Vol. 12, No. 3, pp. 1408–1416.
[10]. Siani, P., and Azzedine, B., (2010). “Privacy, security nd and trust issues arising from cloud computing”. In: 2 IEEE International Conference on Cloud Computing Technology and Science, pp. 693–702.
[11]. Heiser, J., and Nicolett, M., (2008). Assessing the Security Risks of Cloud Computing. Gartner.
[12]. Almond, C., (2009). A Practical Guide to Cloud Computing Security What You Need to Know Now About Your Business and Cloud Security. Avanade Inc., pp. 6-27.
[13]. Zissis, D., and Lekkas, D., (2012). “Addressing cloud computing security issues”. Future Gener. Comput. Syst. Vol. 28, No. 3, pp. 583-592.
[14]. Foster, T., Zhao, Y., and Lu, S., (2009). “Cloud computing resource management through a grid middleware: A case study with diet and eucalyptus”. In: IEEE International Conference on Cloud Computing, pp. 151–154. Accessed 25 August (2015).
[15]. Tarrant, D., Brody, T., and Carr, L., (2015). “From the desktop to the cloud: leveraging hybrid storage architectures in your repository ”. In: International Conference on Open Repositories. Retreived from http://eprints.soton. ac.uk/267084/1/or09.pdf on 25 August (2015).
[16]. https://cloudsecurityalliance.org
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.