2012
DOI: 10.5120/7292-0578
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
65
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(66 citation statements)
references
References 75 publications
0
65
0
1
Order By: Relevance
“…As a consequence, files or stored data in the cloud are openly accessible to all. Therefore, data or files of an individual are vulnerable to attack [2]. It is very easy for an attacker to access, use, and destroy the original data from the cloud data server.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, files or stored data in the cloud are openly accessible to all. Therefore, data or files of an individual are vulnerable to attack [2]. It is very easy for an attacker to access, use, and destroy the original data from the cloud data server.…”
Section: Introductionmentioning
confidence: 99%
“…Data security and privacy are at the forefront of almost all the concerns. The main challenge for MCC is how it addresses the security and privacy concerns of the companies that are considering adopting it [14]. The fact that the company's valuable data resides outside the company's firewall raises serious concerns.…”
Section: Data Security and Privacymentioning
confidence: 99%
“…With this data movement, the residuals of data is left behind which may be accessed by unauthorized users. According to Rohit Bhadauria et al [38], data-remnant causes very less security threats in private cloud but severe security issues may evolve in public cloud donations. This again may lead to data security threats like data leakage, data remnants and inconsistent data, as stated by Hassan Takabi et al [4].…”
Section: A Deployment Models and Its Security Challengesmentioning
confidence: 99%