Various Security Threats and Their Solutions In Cloud Computing

被引:0
|
作者
Barnwal, Anil [1 ]
Pugla, Satyakam [1 ]
Jangade, Rajesh [1 ]
机构
[1] Amity Univ, Noida, UP, India
关键词
CSA; NIST; ENISA; CPNI; ISACA; TCI;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is already known that there are many potential advantages of cloud computing and many enterprise data and applications are shifting to hybrid or public cloud. But there are some big organizations that may not shift to cloud computing due to their critical business applications. The share of the cloud computing in the market is far less than it is expected. The security concerns of the cloud computing especially the issues of privacy protection and data security remain the main reasons of not accepting the services of cloud computing as seen from the user's point of view. This paper summarizes and does the round analysis of various issues related to the privacy protection and data security of cloud computing in various stages in its life cycle. It also describes some current available solutions of those issues and describes the future scope of various issues related to privacy protection and security of data.
引用
收藏
页码:758 / 764
页数:7
相关论文
共 50 条
  • [31] Security Threats in Cloud Computing Models: Domains and Proposals
    Revoredo da Silva, Carlo Marcelo
    Costa da Silva, Jose Lutiano
    Rodrigues, Ricardo Batista
    Medeiros Campos, Glaucia Melissa
    do Nascimento, Leandro Marques
    Garcia, Vinicius Cardoso
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 383 - 389
  • [32] Security Issues and Threats According to the Attribute of Cloud Computing
    Lee, Hyangjin
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 101 - +
  • [33] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 2517 - 2527
  • [34] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [35] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [36] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [37] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [38] A Security Threats Measurement Model for Reducing Cloud Computing Security Risk
    Lai, Sen-Tarng
    Leu, Fang-Yie
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 414 - 419
  • [39] Security in Cloud Computing approaches and solutions
    Ennajjar, I.
    Tabii, Y.
    Benkaddour, A.
    2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, : 57 - 61
  • [40] Security Issues and Solutions in Cloud Computing
    Xie, Yujie
    Lee, Yeonju
    Kim, Kwangmin
    Kim, Pankoo
    INTELLIGENT ENVIRONMENTS 2017, 2017, 22 : 175 - 181