Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014
A Survey on Security Issues and Attacks in Cloud Environment
Varsha Narole, Anil Jaiswal, Narendra Narole
- Now a days Cloud Computing play an important role for provide the services and data storage in the internet. Cloud computing drive out the need of IT based companies to invest in high computing infrastructure and services used by them. In cloud, the data is dwell into set of networked resources that enable data to be accessed via virtual machines. These data canters are located in various parts of the world beyond the control and reach of the user, so there are multiple challenges and security issues that need to be addressed and understood. There are a number of different challenges to make safe cloud infrastructure from different types of attacks. This review paper aims to analyze and elaborate various security issues and attacks in cloud computing which is the base for our future roadmap.
Keywords: Security architecture, privacy, cloud security
Edition: Volume 3 Issue 11, November 2014
Pages: 2543 - 2546
How to Cite this Article?
Varsha Narole, Anil Jaiswal, Narendra Narole, "A Survey on Security Issues and Attacks in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141531, Volume 3 Issue 11, November 2014, 2543 - 2546
Similar Articles with Keyword 'Security architecture'
Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Similar Articles with Keyword 'privacy'
Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi
Similar Articles with Keyword 'cloud security'
Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Similar Articles with Keyword 'Security'
Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Similar Articles with Keyword 'architecture'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Face Detection Using Haar Cascade Classifiers
Bhavana R. Maale, Dr. Suvarna Nandyal