Threats of Cloud Computing Techniques

Authors(2) :-Sivakumar Nadarajan, P. Shanmugasundaram

The term cloud computing is that the foremost well likable keyword in IT-industry currently. Cloud computing is model that uses combine thought of "software-as-a-service” and “utility computing", offer convenient and on-demand services to requested end users. Security in Cloud computing may be a crucial and important aspect, and has various issues and problem associated with it. though cloud computing provides cost-efficient storage services, it is a third party service so, a client cannot trust the cloud service provider to store its data firmly among the cloud. Hence, many organizations and users may not be willing to use the cloud services to store their data within the cloud until sure security guarantees are created. This paper discus regarding cloud computing applications and so the Threats for Cloud Service Users additionally because the Threats for Cloud Service suppliers.

Authors and Affiliations

Sivakumar Nadarajan
Department of Computer Science, J.J.College of Arts and Science, Bharathidasan University, Tiruchirappalli, Tamil Nadu, India
P. Shanmugasundaram
Department of Computer Science, J.J.College of Arts and Science, Bharathidasan University, Tiruchirappalli, Tamil Nadu, India

Cloud Computing, SAAS, Utility Computing

  1. S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The Comparison between Cloud Computing and Grid Computing,” 2010 International Conference on Computer Application and System Modeling (ICCASM), pp. V11-72 - V11-75, DOI= 22-24 Oct. 2010.
  2. T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” 2010 24th IEEE International Conference on Advanced Information Networking and Applications(AINA), pp. 27-33, DOI= 20-23 April 2010.
  3. B. R. Kandukuri, R. V. Paturi and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, Bangalore, India, September 21-25, 2009. In Proceedings of IEEE SCC'2009. pp. 517-520, 2009. ISBN: 978-0-7695-3811-2.
  4. Ohlman, B., Eriksson, A., Rembarz, R. (2009) What Networking of Information Can Do for Cloud Computing. The 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Groningen, The Netherlands, June 29 - July 1, 2009.
  5. Marios D. Dikaiakos, Dimitrios Katsaros, Pankaj Mehra, George Pallis, Athena Vakali, “Cloud Computing: Distributed Internet Computing for IT and Scientific Research,” IEEE Internet Computing Journal, vol. 13, issue. 5, pp. 10-13, September 2009. DOI: 10.1109/MIC.2009.103.
  6. Hanqian Wu, Yi Ding, Winer, C., Li Yao, “Network Security for Virtual Machines in Cloud Computing,” 5th Int’l Conference on Computer Sciences and Convergence Information Technology, pp. 18-21, Seoul, Nov. 30- Dec. 2, 2010. ISBN: 978-1-4244-8567-3.
  7. Bisong, A. and Rahman, S.S.M. (2011). An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), 30-45. doi:10.5121/ijnsa.2011.3103
  8. Suresh, K.S. and Prasad, K.V. (2012). Security Issues and Security Algorithms in Cloud Computing. International Journal of Advanced Research in Computer Science and Software Engineering, 2(10), 110-114.
  9. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D. (2012). Efficient Password-based Two Factors Authentication in Cloud Computing. International Journal of Security and Its Applications, 6(2), 143-148.
  10. Xia Z., Zhu Y., Sun X. and Chen L. (2014), "Secure semantic expansion based search over encrypted cloud data supporting similarity ranking "Journal of Cloud Computing”,Springer 3.1, pp. 1-11.
  11. Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, “Secure, Dependable, and High Performance Cloud Storage”, 2010 29th IEEE International Symposium on Reliable.
  12. Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L. Arockiam. "Research Challenges and Security Issues in Cloud Computing." International Journal of Computational Intelligence and Information Security 3.3 (2012): 42-48.
  13. Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo., “Multimedia Storage Security in Cloud Computing: an Overview” 978-1-457701434- 4/11/$26.00,IEEE,2011.
  14. Cloud Security Alliance, “Top Threats to Cloud Computing v1.0,” Prepared by the Cloud Security Alliance, March 2010, pp. 1-14.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 800-804
Manuscript Number : CSEIT1726210
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Sivakumar Nadarajan, P. Shanmugasundaram, "Threats of Cloud Computing Techniques", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.800-804, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726210

Article Preview

Follow Us

Contact Us