International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148463
|View full text |Cite
|
Sign up to set email alerts
|

Security threats in cloud computing

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…www.ijacsa.thesai.org Safety Threats: Smart vehicles have an increasing number of autonomous driving functions. A failure due to a security breach [2] results into serious accidents, leading to severe danger and threats [12] to the protection of the passengers and of other users on the road in nearby. Hence, CRVANETs depended on Cloud, a centralized model where a single attack disturbs the entire network and results into severe damages.…”
Section: Issue Of Privacymentioning
confidence: 99%
“…www.ijacsa.thesai.org Safety Threats: Smart vehicles have an increasing number of autonomous driving functions. A failure due to a security breach [2] results into serious accidents, leading to severe danger and threats [12] to the protection of the passengers and of other users on the road in nearby. Hence, CRVANETs depended on Cloud, a centralized model where a single attack disturbs the entire network and results into severe damages.…”
Section: Issue Of Privacymentioning
confidence: 99%
“…The problems were analyzing in ranges from organizing newer cryptography primitives on bitcoin to enable use-case privacy protection of file storage. In [12] various security threats are explained in cloud computed and needed to be resolved. In [13] cloud computing security is measured on bases of parameters.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are many techniques and approaches to maintain the secure data in the cloud server. Cloud computing undergoes many attacks and can be secured using methods and techniques to overcome the problems related to the security [12]. Cloud service is available all around the world using standard network protocol accessible from every device with internet connection (laptops, mobile phone, tablets) [13].…”
Section: Introductionmentioning
confidence: 99%
“…f.Wrong usage of CC and its services: Cloud computing service providers give access to try their cloud services for a limited period of time for free. Some users utilize this trial period to misuse the resources obtained through CC service provider [2].…”
Section: Dmalicious Users Handlingmentioning
confidence: 99%
“…Neha Kajal et. al (2015) : This research work has analyzed the various security aspects that are vulnerable to the cloud computing and needed to be resolved.…”
Section: Related Workmentioning
confidence: 99%