Threats and Vulnerabilities of Cloud Computing: A Review
DOI:
https://doi.org/10.26438/ijcse/v6i3.297302Keywords:
Cloud Computing, Cloud Security, Cloud Threats, Cloud VulnerabilitiesAbstract
Cloud computing is a new frontier in computing technologies. It is well known for its pay-per-use model for billing customers and providing other features like elasticity, ubiquity, scalability, and availability of resources for businesses. Cloud computing provides delivery models like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS) which can be utilized by various organizations to solve their data storage and processing needs. From recent surveys conducted by well known reputed cloud providers, it is apparent that more and more organizations and enterprises are moving their workloads to cloud. The top concern among the organizations to move their workloads or processes to cloud is security. Even though the security measures provided in cloud computing are evolving over the years, it still remains as a major challenge or obstacle. This paper provides an overview of numerous threats and vulnerabilities of cloud computing which can act as a guide to decision makers in organizations to evaluate the security in clouds.
References
K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," J. Internet Serv. Appl., vol. 4, no. 1, p. 5, 2013.
P. S. Suryateja, "A Comparative Analysis of Cloud Simulators," Int. J. Mod. Educ. Comput. Sci., vol. 8, no. 4, pp. 64–71, 2016.
Tripwire Top Cloud Security Threats - https://www.tripwire.com/state-of-security/security-data-protection/cloud/top-cloud-security-threats/ (last accessed on Mar, 2018)
CSOonline Top Cloud Security Threats 2018 - https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html (last accessed on Mar, 2018)
Comparethecloud 8 Public Cloud Security Threats - https://www.comparethecloud.net/articles/8-public-cloud-security-threats-to-enterprises-in-2017/ (last accessed on Mar, 2018)
Tierpoint Top 5 Cloud Data Security Threats - https://www.tierpoint.com/top-5-cloud-data-security-threats-in-2018/ (last accessed on Mar, 2018)
Techtarget Five Cloud Security Threats to Combat in 2018 - http://searchcloudcomputing.techtarget.com/tip/Five-cloud-security-threats-to-combat-in-2018 (last accessed on Mar, 2018)
S. Bulusu, "A Study on Cloud Computing Security Challenges," 2012.
B. T. Rao, "A Study on Data Storage Security Issues in Cloud Computing," Procedia - Procedia Comput. Sci., vol. 92, pp. 128–135, 2016.
N. Khan and A. Al-yasiri, "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework," Procedia - Procedia Comput. Sci., vol. 94, pp. 485–490, 2016.
G. Somani, M. Singh, D. Sanghi, M. Conti, and R. Buyya, "DDoS attacks in cloud computing : Issues , taxonomy , and future directions," Comput. Commun., vol. 107, pp. 30–48, 2017.
B. Varghese and R. Buyya, "Next Generation Cloud Computing: New Trends and Research Directions," vol. 2017, no. September, pp. 1–22, 2017.
B.SriVarsha, P.S.Suryateja, "Using Advanced Encryption Standard for Secure and Scalable Sharing of personal Health Records in Cloud," International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5(6), 7745-7747, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
