SECURITY TECHNIQUES TO PREVENT THREATS AND ATTACKS IN CLOUD ENVIRONMENT

Main Article Content

M. Naina Bharathi Rao
Farheen Sheik
Rashmi G O,
Gopal Krishna Shyam

Abstract

Cloud computing is progressing at a very fast pace and more and more number of IT companies have either migrated to cloud or are in the process. So, it is very important to secure the data and gain trust of the Organizations. Off late, cloud computing is facing a lot of challenges in terms of security to data, network and other cloud resources due to Active and Passive attacks. For effectiveness of cloud computing, there is an urgent need to arrest these attacks by addressing the vulnerabilities and improve the security. This survey points out some of the security approaches used by prime companies in cloud computing, to avert attacks on data security.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Sunilkumar S. Manvi, Gopal Kirshna Shyam, "Resource Management for IaaS in Cloud Computing: A Survey", Elsevier Journal of Network and Computer Applications, Vol. 41, No.1, 2014, pp.424-440. [2]https://pdfs.semanticscholar.org/a28b/3c33f8ebb29983ddd1 f223513c7f1d11cf39.pdf by Mohammad Ubaidullah Bokhari and Qahtan Makki Shallal ,Dept. of Computer Science, Aligarh Muslim University Aligarh, India. [3]https://www.csoonline.com/article/3217029/cloudsecurity/amazon-macie-automates-cloud-data-protection-withmachine-learning.html [4] Dinesh R. C, Ashwin R, "Multi-Agent based Cloud Services", International Journal of Computer Applications, Vol.2, No.1, 2012, pp. 7-10 [5]http://www.datacenterjournal.com/combatting-cloudsecurity-threats-tools-best-practices/