The Security Threats in Cloud Architecture-A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Information Technology | India | Volume 5 Issue 7, July 2016

The Security Threats in Cloud Architecture-A Review

Simanjot Kaur, Anurag Singh Tomar

The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. The security, access controls are the various issues which are in the cloud architecture. The security is the main issue which reduce the performance of cloud architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious nodes may join the network which spoof data of the legitimate and zombie nodes start communicate with virtual machine on the behalf of legitimate node. In this work, enhancement will be proposed in access control scheme which will detect malicious nodes from the network and isolate then from the cloud architecture.

Keywords: Cloud Computing, Security, Mutual Authentication Schemes

Edition: Volume 5 Issue 7, July 2016

Pages: 1953 - 1955

Share this Article

How to Cite this Article?

Simanjot Kaur, Anurag Singh Tomar, "The Security Threats in Cloud Architecture-A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016645, Volume 5 Issue 7, July 2016, 1953 - 1955

113 PDF Views | 106 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015

Pages: 1736 - 1745

Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs

Haider N. Hussain

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1204 - 1206

Identity Management as a Service in Cloud

Rahul Relan, Savaridassan P.

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

Informative Article, Information Technology, India, Volume 6 Issue 3, March 2017

Pages: 1283 - 1284

Android Security, An Overview

Raj Singh Gaur

Share this Article
Top