International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 2, February 2014


Defensive Security Mechanisms for Cloud Computing Security Risks- A Review

Geethu Krishna [2] | Jyothis T. S


Abstract: This paper compares various mitigation techniques which are used to reduce the security risks that the cloud computing environment underlying with and as well as the concepts through which these tasks are accomplished. Also analyses whether such defensive security mechanisms can provide an automated defence for both the known and unknown malware security risks in the cloud.


Keywords: Mitigation techniques, cloud computing, defensive security mechanisms, malware security risks


Edition: Volume 3 Issue 2, February 2014,


Pages: 73 - 75


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Geethu Krishna, Jyothis T. S, "Defensive Security Mechanisms for Cloud Computing Security Risks- A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 2, February 2014, pp. 73-75, https://www.ijsr.net/get_abstract.php?paper_id=2013873

Similar Articles with Keyword 'Mitigation techniques'

Downloads: 113

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 2, February 2016

Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali | Dr. Abdelrahman Elsharif Karrar [5]

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana [69] | Raj Kumar [65]

Share this Article
Top