An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment

Authors

  • Chandra N Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India
  • Rastogi P Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India
  • Asthana A Department of CSE, SITE, Swami Vivekanand Subharti University, Meerut (UP), India

DOI:

https://doi.org/10.26438/ijcse/v6i3.408413

Keywords:

Cloud Computing, Attacks, Intrusion Detection System, Intrusion Prevention System

Abstract

Cloud computing offers services with much flexibility and very less infrastructure because of the distributed structure of cloud computing, this technology is used by an increasing number of end users. On the other hand, cloud computing presents an added level of risk because clouds are distributed in nature, so it becomes an easy targets for the intruders to exploit the vulnerabilities of the network. Therefore in this paper we have discussed the need of security mentioning different types of attacks which affect the availability, confidentiality and integrity of resources and services in cloud computing environment and suggested the cloud providers to protect the user data and information from inside or outside attacks by installing an intrusion detection and prevention system.

References

Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp. 347-358.

Zhang S, Zhang S, Chen X, Huo X(2010) Cloud Computing Research and Development Trend in Second International Conference on Future Networks, Sanya, Henan, China, IEEE Computer Society, Washington, DC, USA, pp. 93-97

B R. Kandukuri, R. Paturi V.and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, Sep 21-25,2009, Bangalore, India, pp. 517-520.

E. H. Spafford and D. Zamboni, “Intrusion Detection Using Autonomous Agent,” Computer Networks, Vol. 34, Issue 4, 2000, pp. 547-570.

Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande,”Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research, Vol. 1, Issue 4,May 2012, pp. 67-71.

Chi-Chun Lo, Chun-Chieh Huang, Joy Ku, “A Cooperative Intrusion Detection System Framework for Clouding Computing Networks,” 2010, 39th International Conference on Parallel Processing Workshops, pp. 280-284.

Anna Lenart, “ERP in the Cloud- Benefits and Challenges,”Springer Verlag Berlin Heidelberg, 2011, pp. 39-50.

C. Modi, D. Patel, B. Borisaniya, H. Patel, M. Rajarajan, “A Survey OF Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36(2013), pp. 42-57.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i3.408413
Published: 2025-11-12

How to Cite

[1]
N. Chandra, P. Rastogi, and A. Asthana, “An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment”, Int. J. Comp. Sci. Eng., vol. 6, no. 3, pp. 408–413, Nov. 2025.

Issue

Section

Review Article