An analysis On Security Concerns and Their Possible Solutions in Cloud Computing Environment
DOI:
https://doi.org/10.26438/ijcse/v6i3.408413Keywords:
Cloud Computing, Attacks, Intrusion Detection System, Intrusion Prevention SystemAbstract
Cloud computing offers services with much flexibility and very less infrastructure because of the distributed structure of cloud computing, this technology is used by an increasing number of end users. On the other hand, cloud computing presents an added level of risk because clouds are distributed in nature, so it becomes an easy targets for the intruders to exploit the vulnerabilities of the network. Therefore in this paper we have discussed the need of security mentioning different types of attacks which affect the availability, confidentiality and integrity of resources and services in cloud computing environment and suggested the cloud providers to protect the user data and information from inside or outside attacks by installing an intrusion detection and prevention system.
References
Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N (2009) Cloud Computing: A Statistics Aspect of Users. First International Conference on Cloud Computing (CloudCom), Beijing, China. Springer Berlin, Heidelberg, pp. 347-358.
Zhang S, Zhang S, Chen X, Huo X(2010) Cloud Computing Research and Development Trend in Second International Conference on Future Networks, Sanya, Henan, China, IEEE Computer Society, Washington, DC, USA, pp. 93-97
B R. Kandukuri, R. Paturi V.and A. Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Services Computing, Sep 21-25,2009, Bangalore, India, pp. 517-520.
E. H. Spafford and D. Zamboni, “Intrusion Detection Using Autonomous Agent,” Computer Networks, Vol. 34, Issue 4, 2000, pp. 547-570.
Ms. Parag K. Shelke, Ms. Sneha Sontakke, Dr. A. D. Gawande,”Intrusion Detection System for Cloud Computing”, International Journal of Scientific & Technology Research, Vol. 1, Issue 4,May 2012, pp. 67-71.
Chi-Chun Lo, Chun-Chieh Huang, Joy Ku, “A Cooperative Intrusion Detection System Framework for Clouding Computing Networks,” 2010, 39th International Conference on Parallel Processing Workshops, pp. 280-284.
Anna Lenart, “ERP in the Cloud- Benefits and Challenges,”Springer Verlag Berlin Heidelberg, 2011, pp. 39-50.
C. Modi, D. Patel, B. Borisaniya, H. Patel, M. Rajarajan, “A Survey OF Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36(2013), pp. 42-57.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
