SECURITY TECHNIQUES TO PREVENT THREATS AND ATTACKS IN CLOUD ENVIRONMENT

M. Naina Bharathi Rao, Farheen Sheik, Rashmi G O,, Gopal Krishna Shyam

Abstract


Cloud computing is progressing at a very fast pace and more and more number of IT companies have either migrated to cloud or are in the process. So, it is very important to secure the data and gain trust of the Organizations. Off late, cloud computing is facing a lot of challenges in terms of security to data, network and other cloud resources due to Active and Passive attacks. For effectiveness of cloud computing, there is an urgent need to arrest these attacks by addressing the vulnerabilities and improve the security. This survey points out some of the security approaches used by prime companies in cloud computing, to avert attacks on data security.

Keywords


Cloud computing; Security; Attacks; Network; Cloud resources;

Full Text:

PDF

References


Sunilkumar S. Manvi, Gopal Kirshna Shyam, "Resource Management for IaaS in Cloud Computing: A Survey", Elsevier Journal of Network and Computer Applications, Vol. 41, No.1, 2014, pp.424-440. [2]https://pdfs.semanticscholar.org/a28b/3c33f8ebb29983ddd1 f223513c7f1d11cf39.pdf by Mohammad Ubaidullah Bokhari and Qahtan Makki Shallal ,Dept. of Computer Science, Aligarh Muslim University Aligarh, India. [3]https://www.csoonline.com/article/3217029/cloudsecurity/amazon-macie-automates-cloud-data-protection-withmachine-learning.html [4] Dinesh R. C, Ashwin R, "Multi-Agent based Cloud Services", International Journal of Computer Applications, Vol.2, No.1, 2012, pp. 7-10 [5]http://www.datacenterjournal.com/combatting-cloudsecurity-threats-tools-best-practices/




DOI: https://doi.org/10.26483/ijarcs.v9i0.6258

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science