Various Security Threats and Their Solutions In Cloud Computing

被引:0
|
作者
Barnwal, Anil [1 ]
Pugla, Satyakam [1 ]
Jangade, Rajesh [1 ]
机构
[1] Amity Univ, Noida, UP, India
关键词
CSA; NIST; ENISA; CPNI; ISACA; TCI;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is already known that there are many potential advantages of cloud computing and many enterprise data and applications are shifting to hybrid or public cloud. But there are some big organizations that may not shift to cloud computing due to their critical business applications. The share of the cloud computing in the market is far less than it is expected. The security concerns of the cloud computing especially the issues of privacy protection and data security remain the main reasons of not accepting the services of cloud computing as seen from the user's point of view. This paper summarizes and does the round analysis of various issues related to the privacy protection and data security of cloud computing in various stages in its life cycle. It also describes some current available solutions of those issues and describes the future scope of various issues related to privacy protection and security of data.
引用
收藏
页码:758 / 764
页数:7
相关论文
共 50 条
  • [21] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [22] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113
  • [23] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [24] Cloud Computing Threats and Provider Security Assessment
    Yu, Huiming
    Williams, Ken
    Yuan, Xiaohong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 238 - 250
  • [25] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [26] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [27] Exploration of Various Cloud Security Challenges and Threats
    Chitturi, Arun Krishna
    Swarnalatha, Purushotham
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 891 - 899
  • [28] Cloud security: Emerging threats and current solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 126 - 140
  • [29] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [30] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428