A Survey on Security Threats and Attacks in Cloud Computing

Authors

  • VP Muthukumar Department of Computer Science Vivekananda College of Arts and Sciences For Women, Namakkal, Tamil Nadu, India
  • R Saranya Department of Computer Science Vivekananda College of Arts and Sciences for Women, Namakkal, TamilNadu, India

Keywords:

Cloud Computing, Security, Threats, attacks, Cloud Service Provider

Abstract

Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security threats and Technical Components of Cloud Computing.

References

. S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.

. J Brodkin. (2008). Gartner Seven cloud-computing security risks. Available: http://www.networkworld.com/news/200S!07020Scloud. Html

. D. L. Ponemon, "Security of Cloud Computing Users," 2010.

. S. K. Tim Mather, and Shahed Latif, Cloud Security and Privacy: O'Reilly Media, Inc , 2009.

. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.

. http://cloudsecurity.trendmicro.com/

. N. Mead, et ai, "Security quality requirements engineering (SQUARE) methodolgy," Carnegie Mellon Software Engineering Institute.

. J. W.Rittinghouse and J. F.Ransome, Cloud Computing: Taylor and Francis Group, LLC, 2010.

. T. Mather. (2011). Data Leakage Prevention and Cloud Computing. Available: http://www.kpmg.com/Globa1/Pages/default.aspx.

. P. Coffee, "Cloud Computing: More Than a Virtual Stack," ed: salesforce.com. [II] z. Zorz, "Top 7 threats to cloud computing," 2010.

. Security Management in the Cloud. Available http://mscerts.net/programming/Security%20Management%20in%20t he%20Cloud.aspx

. (2010). Security Management in the Cloud – Access Control.

. P. Sefton, "Privacy and data control in the era of cloud computing.

Downloads

Published

2014-12-06

How to Cite

[1]
V. Muthukumar and R. Saranya, “A Survey on Security Threats and Attacks in Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 2, no. 11, pp. 120–125, Dec. 2014.