A Survey on Security Threats and Attacks in Cloud Computing
Keywords:
Cloud Computing, Security, Threats, attacks, Cloud Service ProviderAbstract
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security threats and Technical Components of Cloud Computing.
References
. S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.
. J Brodkin. (2008). Gartner Seven cloud-computing security risks. Available: http://www.networkworld.com/news/200S!07020Scloud. Html
. D. L. Ponemon, "Security of Cloud Computing Users," 2010.
. S. K. Tim Mather, and Shahed Latif, Cloud Security and Privacy: O'Reilly Media, Inc , 2009.
. C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.
. http://cloudsecurity.trendmicro.com/
. N. Mead, et ai, "Security quality requirements engineering (SQUARE) methodolgy," Carnegie Mellon Software Engineering Institute.
. J. W.Rittinghouse and J. F.Ransome, Cloud Computing: Taylor and Francis Group, LLC, 2010.
. T. Mather. (2011). Data Leakage Prevention and Cloud Computing. Available: http://www.kpmg.com/Globa1/Pages/default.aspx.
. P. Coffee, "Cloud Computing: More Than a Virtual Stack," ed: salesforce.com. [II] z. Zorz, "Top 7 threats to cloud computing," 2010.
. Security Management in the Cloud. Available http://mscerts.net/programming/Security%20Management%20in%20t he%20Cloud.aspx
. (2010). Security Management in the Cloud – Access Control.
. P. Sefton, "Privacy and data control in the era of cloud computing.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
