Full Paper View Go Back

Study of Threats, Risk and Challenges in Cloud Computing

R.Piplode 1 , P. Sharma2 , U.K. Singh3

Section:Review Paper, Product Type: Isroset-Journal
Vol.1 , Issue.1 , pp.26-30, Jan-2013


Online published on Dec 12, 2013


Copyright Š R.Piplode, P. Sharma , U.K. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Piplode, P. Sharma , U.K. Singh, “Study of Threats, Risk and Challenges in Cloud Computing,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.

MLA Style Citation: R.Piplode, P. Sharma , U.K. Singh "Study of Threats, Risk and Challenges in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.1 (2013): 26-30.

APA Style Citation: R.Piplode, P. Sharma , U.K. Singh, (2013). Study of Threats, Risk and Challenges in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(1), 26-30.

BibTex Style Citation:
@article{Sharma_2013,
author = {R.Piplode, P. Sharma , U.K. Singh},
title = {Study of Threats, Risk and Challenges in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2013},
volume = {1},
Issue = {1},
month = {1},
year = {2013},
issn = {2347-2693},
pages = {26-30},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=18},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=18
TI - Study of Threats, Risk and Challenges in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - R.Piplode, P. Sharma , U.K. Singh
PY - 2013
DA - 2012/12/12
PB - IJCSE, Indore, INDIA
SP - 26-30
IS - 1
VL - 1
SN - 2347-2693
ER -

4514 Views    4349 Downloads    4230 Downloads
  
  

Abstract :
Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper we present security issues that fetch by cloud computing technology and also analysis the threats, risk and challenges in cloud environment.

Key-Words / Index Term :
Cloud Computing, Security Risk, Service Models, Deployment Models

References :
[1] National Institute Of Standard and technology (2009). www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,
[2] Open Security Architecture http://www.opensecurityarchitecture.org/
[3] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks
[4] K.Mukherjee , G.Sahoo, “A Secure Cloud Computing”, Proc. 2010 International Conference on Recent Trends in Information, Telecommunication and Computing
[5] KreĹĄimir Popović, Ĺ˝eljko Hocenski, “Cloud computing security issues and challenges” Proc. MIPRO 2010, May 24-28, 2010, Opatija, Croatia
[6] Cloud computing security retrived from
http://en.wikipedia.org/wiki/Cloud_computing _security
[7] Meiko Jensen, J¨org Schwenk, Nils Gruschka, Luigi Lo Iacono “ On Technical Security Issues in Cloud Computing” 2009 IEEE International Conference on Cloud Computing.
[8] Rituik Dubey, Muhammad Asim Jamshed, Xiaohui Wang, Rama Krishna Batalla “Addressing Security Issues in Cloud Computing”.
[9] Shilpashree Srinivasamurthy, David Q. Liu, “ Survey on Cloud Computing Security”.
[10] Salesforce, Salesforce.com, 2010
[11] Windows Azure, www.microsoft.com/azure, 2010
[12] Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[13] Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. CCSW `09: Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. November 2009.
[14] Steve Hanna. A security analysis of Cloud Computing. Cloud Computing Journal.
www.cloudcomputing.sys-con.com/node/1203943 .
[15] Matthew Glotzbach, Product Management Director, Google Enterprise, “What We Learned from 1 Million Businesses in the Cloud,” www.googleblog.blogspot.com/2008/10/whatwe-learned-from-1-illion.html, 30 Oct 2008.
[16] Krßgel, C., Toth, T., & Kirda, E. (2002). Service specific anomaly detection for network intrusion detection. In Proceedings of the 2002 ACM symposium on Applied computing (pp. 201-208). Madrid, Spain: ACM. Retrieved from www.portal.acm.org.library.capella.edu/citation.cfm?id=508835&dl=GUIDE&coll=GUIDE&CFID=80867670&CFTOKEN=24312614
[17] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp(13-19), December 2011. http://www.iracst.org/ijcnwc/vol1no1.htm)

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation