Review Papers | Information Technology | India | Volume 5 Issue 7, July 2016
The Security Threats in Cloud Architecture-A Review
Simanjot Kaur, Anurag Singh Tomar
The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. The security, access controls are the various issues which are in the cloud architecture. The security is the main issue which reduce the performance of cloud architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious nodes may join the network which spoof data of the legitimate and zombie nodes start communicate with virtual machine on the behalf of legitimate node. In this work, enhancement will be proposed in access control scheme which will detect malicious nodes from the network and isolate then from the cloud architecture.
Keywords: Cloud Computing, Security, Mutual Authentication Schemes
Edition: Volume 5 Issue 7, July 2016
Pages: 1953 - 1955
How to Cite this Article?
Simanjot Kaur, Anurag Singh Tomar, "The Security Threats in Cloud Architecture-A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016645, Volume 5 Issue 7, July 2016, 1953 - 1955
113 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'Cloud Computing'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 1773 - 1777Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling
Muskan Garg, Rajneesh Narula
Research Paper, Information Technology, Iraq, Volume 4 Issue 11, November 2015
Pages: 1736 - 1745Recommendations to Evaluate and Choose Cloud Services and Deployment Models for e-Business Strategic Use: A Case Study of Malaysian SMEs
Haider N. Hussain
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1204 - 1206Identity Management as a Service in Cloud
Rahul Relan, Savaridassan P.
Similar Articles with Keyword 'Security'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1868 - 1870A Survey on Privacy Assurance in Personalized Web Search
Abhilasha V. Biradar, K. B. Sadafale
Informative Article, Information Technology, India, Volume 6 Issue 3, March 2017
Pages: 1283 - 1284Android Security, An Overview
Raj Singh Gaur