Security Hazards, Attacks and Its Prevention Techniques in Cloud Computing : A Detail Review
DOI:
https://doi.org/10.32628/CSEIT206417Keywords:
Cloud Computing, Data Privacy, Security, Confidential Data, Cyber Attacks, Hazards, Prevention Techniques.Abstract
Significant technical advances have emerged over the last decade, potentially bringing more simplicity to everyday life activities not only at the level of the organization, but also at the personal level. Recently, it has become apparent that many companies and businesses are moving their workloads to the cloud. Nevertheless, with the rapid growth and appealing products, there are still several concerns surrounding this technology that must be dealt with protection having the biggest obstacle to its acceptance. Safety issues are a continuing field of research that needs to be adequately handled to prevent security breaches and disaster-related attacks for service providers and service users. This survey addresses conceptual architecture of cloud computing, essential criteria of safety for cloud computing, security risks to cloud computing and attacks on security on cloud computing with its mitigation techniques.
References
- Jansen, W. A., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing.
- Chowdhury, R. R. (2014). Security in cloud computing. International Journal of Computer Applications, 96(15).
- Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds: towards a cloud definition.
- Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18.
- A. Asma, M. A. Chaurasia and H. Mokhtar, Cloud Computing Security Issues, International Journal of Application or Innovation in Engineering & Management, 1(2) (2012) 141 - 147.
- Ughade, K. A., & Chopde, N. R. (2015). Survey on Security Threats and Security Algorithms in Cloud Computing. International Journal of Science and Research, 4(4), 2196-2200.
- Kajal, N., & Ikram, N. (2015, May). Security threats in cloud computing. In International Conference on Computing, Communication & Automation (pp. 691-694). IEEE..
- Catteddu, D. (2009, December). Cloud Computing: benefits, risks and recommendations for information security. In Iberic Web Application Security Conference (pp. 17-17). Springer, Berlin, Heidelberg.
- Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. In 2011 World Congress on Information and Communication Technologies (pp. 217-222). IEEE.
- Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The journal of supercomputing, 63(2), 561-592.
- “CSA: The Notorious Nine Cloud Computing Top Threats," Cloud Security Alliance, 2013.
- Claycomb, W. R., & Nicoll, A. (2012, July). Insider threats to cloud computing: Directions for new research challenges. In 2012 IEEE 36th Annual Computer Software and Applications Conference (pp. 387-394). IEEE.
- Panah, A., Panah, A., Panah, O., & Fallahpour, S. (2012). Challenges of security issues in cloud computing layers. Rep. Opin, 4(10), 25-29.
- Amara, N., Zhiqui, H., & Ali, A. (2017, October). Cloud computing security threats and attacks with their mitigation techniques. In 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 244-251). IEEE.
- "CSA: Top Threats to Cloud Computing," Cloud Security Alliance, 2010.
- Shah, H., Rajani, I. K., & Ramoliya, D. (2019). RENDERING THE GPGPU ACTIVITIES FOR ACCELERATION OF DYNAMIC THREAD PROGRAMMING IN HIGH PERFORMANCE COMPUTING.
- Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
- S. T.K and D. B, “Security Attack Issues and Mitigation Techniques in Cloud Computing Environments,” Int. J. UbiComp, vol. 7, no. 1, pp. 1–11, Jan. 2016.
- Wu, T. Y., Chen, C. M., Sun, X., Liu, S., & Lin, J. C. W. (2017). A countermeasure to SQL injection attack for cloud environment. Wireless Personal Communications, 96(4), 5279-5293.
- Deshpande, P., Sharma, S. C., Peddoju, S. K., & Abraham, A. (2018). Security and service assurance issues in Cloud environment. International Journal of System Assurance Engineering and Management, 9(1), 194-207.
- Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
- Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
- Deshpande, P., Sharma, S. C., Peddoju, S. K., & Abraham, A. (2018). Security and service assurance issues in Cloud environment. International Journal of System Assurance Engineering and Management, 9(1), 194-207.
- Akbarabadi, A., Zamani, M., Farahmandian, S., Zadeh, J. M., & Mirhosseini, S. M. (2013). An overview on methods to detect port scanning attacks in cloud computing. environment, 1, 22-25.
- Singh, A., & Shrivastava, D. M. (2012). Overview of attacks on cloud computing. International Journal of Engineering and Innovative Technology (IJEIT), 1(4).
- Anitha, R., Pradeepan, P., Yogesh, P., & Mukherjee, S. (2013, August). Data storage security in cloud using metadata. In 2nd International Conference on Machine Learning and Computer Science (IMLCS'2013), Kuala Lumpur (Malaysia) (pp. 26-30).
- Mishra, P., Pilli, E. S., Varadharajan, V., & Tupakula, U. (2017). Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications, 77, 18-47.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.