International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 114 | Views: 213

Review Papers | Information Technology | India | Volume 5 Issue 7, July 2016 | Rating: 6.2 / 10

The Security Threats in Cloud Architecture-A Review

Simanjot Kaur | Anurag Singh Tomar

Abstract: The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. The security, access controls are the various issues which are in the cloud architecture. The security is the main issue which reduce the performance of cloud architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious nodes may join the network which spoof data of the legitimate and zombie nodes start communicate with virtual machine on the behalf of legitimate node. In this work, enhancement will be proposed in access control scheme which will detect malicious nodes from the network and isolate then from the cloud architecture.

Keywords: Cloud Computing, Security, Mutual Authentication Schemes

Edition: Volume 5 Issue 7, July 2016,

Pages: 1953 - 1955

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait