CFP last date
20 May 2024
Reseach Article

Analysis of Threats and Attacks on Privacy and Security of Cloud Computing

by Ruchi Dubey, Nirmal Gaud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 13
Year of Publication: 2016
Authors: Ruchi Dubey, Nirmal Gaud
10.5120/ijca2016912564

Ruchi Dubey, Nirmal Gaud . Analysis of Threats and Attacks on Privacy and Security of Cloud Computing. International Journal of Computer Applications. 156, 13 ( Dec 2016), 34-39. DOI=10.5120/ijca2016912564

@article{ 10.5120/ijca2016912564,
author = { Ruchi Dubey, Nirmal Gaud },
title = { Analysis of Threats and Attacks on Privacy and Security of Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 13 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number13/26781-2016912564/ },
doi = { 10.5120/ijca2016912564 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:33.535299+05:30
%A Ruchi Dubey
%A Nirmal Gaud
%T Analysis of Threats and Attacks on Privacy and Security of Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 13
%P 34-39
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many IT professionals would have the same opinion that cloud computing is the most innovatory information delivery model since the beginning of the Internet. For corporate management and decision makers, cloud computing brings many financial and functional benefits as well as serious security concerns that may threaten business stability and corporate status. But this technology is still uncertain to many security troubles. The definition of cloud computing is still fuzzy in a large part, because of the magnitude of the security risks and the virtually unlimited amount of information being published. With many business ventures, as the use of cloud environments grow day-by-day and for this the risk and the threats associated with a successful use of the model also increase. In this paper we analysis of various threats and attacks on privacy and security of cloud computing.

References
  1. Lim, C., Suparman, and A.: Risk analysis and comparative study of the different cloud computing providers in Indonesia. In: 2012 International Conference on Cloud Computing and Social Networking (ICCCSN). IEEE (2012).
  2. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory (2011).
  3. Mahesh U. Shankarwar and Ambika V. Pawar:”Security and Privacy in Cloud Computing: A Survey.
  4. Mazhar Ali, Samee U. Khan ,Athanasios V. Vasilakos:”Security in cloud computing: Opportunities and challenges.
  5. M.D. Ryan, Cloud computing security: the scientific challenge, and a survey of solutions, J. Syst. Software. 86 (09) (2013) 2263–2268.
  6. M. Sadiku, S. Musa, O. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials 33 (1) (2014) 34–36.
  7. Kiran M, Khan AU, Jiang M, Djemame K, Oriol M, Corrales M (2012) Managing security threats in Clouds, Digital Research 2012 .
  8. Khan AU, Kiran M, Oriol M, Jiang M, Djemame K (2012) Security risks and their management in Cloud computing. CloudCom, pp 121–128, 2012.
  9. Mariam Kiran; “A Methodology for Cloud Security Risks Management” Springer International Publishing Switzerland 2014.
  10. 2015-isbs-technical-report-blue:” 2015 Information Security Breaches Survey” survey conducted by pwcIn association with info security Europe.
  11. Kiran M, Khan AU, Jiang M, Djemame K, Oriol M, Corrales M (2012) Managing security threats in Clouds, Digital Research 2012.
  12. Khan AU (2013) Data confidentiality and risk management in Cloud Computing, PhD thesis, Department of Computer Science, University of York, 2013.
  13. Whiteside F, Badger L, Iorga M, Shilong Chu JM (2012) Challenging security requirements for US government Cloud computing adoption (draft), Special publication 500-296, NIST, May, 2012.
  14. Catteddu D, Hogben G (2009) Cloud computing: benefits, risks and recommendations for information security, Technical Report, European Network and Information Security Agency (ENISA) 2009.
  15. Information Security Forum (ISF), Information risk analysis methodology (IRAM Accessed April 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Threat Category Security Risk Assessment