A survey on top security threats in cloud computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 3
Abstract
Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.
Authors and Affiliations
Muhammad Kazim, Shao Zhu
Digital Image Watermarking Technique Based on Different Attacks
Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different...
A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing
Mobile Crowdsourcing (MCS) surfaced as a new affluent method for data collection and processing as a result of the boom of sensor-rich mobile devices popularity. MCS still has room for improvement, particularly in protec...
A New Algorithm for Balancing Group Population in Collaborative Leaning Sessions
Proper group formation is essential in conducting a productive collaborative learning session. It specifies the internal structure that the collaborating groups should have based on roles. The Group formation is a dynami...
Comprehensive Survey on Dynamic Graph Models
Most of the critical real-world networks are con-tinuously changing and evolving with time. Motivated by the growing importance and widespread impact of this type of networks, the dynamic nature of these networks have ga...
Web Server Performance Evaluation in a Virtualisation Environment
Operational and investment costs are reduced by resource sharing in virtual machine (VM) environments, which also results in an overhead for hosted services. VM machine performance is important because of resource conten...