2018
DOI: 10.11591/ijece.v8i5.pp3129-3139
|View full text |Cite
|
Sign up to set email alerts
|

Review on Security Aspects for Cloud Architecture

Abstract: Cloud computing is one of the fastest growing and popular technology in the field of computing. As the concept of cloud computing was introduced in 2006. Since then large number of IT industries join the queue to develop many cloud services and put sensitive information over cloud. In fact cloud computing is no doubt the great innovation in the field of computing but at the same time also poses many challenges. Since a large number of organizations migrate their business to cloud and hence it appears as an att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
(38 reference statements)
0
3
0
Order By: Relevance
“…Cloud Security Alliance (CSA) defines the boundries between the Service provider and the service user with maximum responsibilities at the SaaS and least services at the IaaS for the provider. Handling of security responsibilities is tedious task even though the responsibilities have defined boundries due to various constraints such as non detection of vulnerabilities and threats at early stage [15].…”
Section: Cloud Securitymentioning
confidence: 99%
“…Cloud Security Alliance (CSA) defines the boundries between the Service provider and the service user with maximum responsibilities at the SaaS and least services at the IaaS for the provider. Handling of security responsibilities is tedious task even though the responsibilities have defined boundries due to various constraints such as non detection of vulnerabilities and threats at early stage [15].…”
Section: Cloud Securitymentioning
confidence: 99%
“…Security control normally implement at three levels such as vulnerability, attack and threat. As we all know, all three level are highly correlated to each other [4]. So it is better to pre analyse the cause at earliest level.…”
Section: Introductionmentioning
confidence: 99%
“…Malware are one of the most powerful cybercriminals' tools for attaining such goals [1][2]. One the type of the malicious action against the users' computer systems, cloud infrastructure the distributed denial-of-service (DDoS) attacks-the attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic [3].…”
Section: Introductionmentioning
confidence: 99%