The Vulnerabilities of Cloud Computing: Security Threats

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 2

Abstract

Clouds give an intense figuring stage that empowers people and associations to perform assortment levels of undertakings, for example, utilization of online storage room, selection of business applications, improvement of tweaked PC programming, and formation of a "practical" system condition. In earlier years, the quantity of individuals utilizing cloud administrations has drastically expanded and loads of information has been put away in Cloud computing situations. Meanwhile, information breaks to cloud administrations are likewise expanding each year because of programmers who are continually attempting to misuse the security vulnerabilities of the design of cloud. In this paper, three cloud benefit models were thought about; cloud security dangers and dangers were researched in light of the way of the cloud benefit models.True cloud assaults were incorporated to exhibit the methods that programmers utilized against Cloud computing frameworks. Likewise, countermeasures to cloud security ruptures are exhibited.

Authors and Affiliations

Mr. Nagesh Salimath, Dr. Jitendra Sheetlani

Keywords

Related Articles

Effective query processing techniques for heterogeneous application data

In the different application environment, in order to a chievea effective query processing result stechniques are required. This type of effective query processing result techniques are implementing in order to different...

 Image Enhancement Techniques: A Selected Review

 Image enhancement is one of the key issues in high quality pictures such as digital cameras. Since image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the image....

Security Suite for IT and Telecom Industries

Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...

 Creating a Bicycle Design Approach Model Based on FashionStyles

Abstract: The authors created a Bicycle Design Approach Model Based on Fashion Styles as a means ofsupporting idea generation for product development that takes into account customer sensibilities, and theeffectiveness o...

 Image Noise Removal by Dual Threshold Median Filter for RVIN

 Abstract: Removal of random valued impulse noise in digital images with edge preservation is one of thechallenging tasks in digital image processing. For removal of impulse noise as well as preserve edge proposeda...

Download PDF file
  • EP ID EP384468
  • DOI 10.9790/0661-1902053643.
  • Views 113
  • Downloads 0

How To Cite

Mr. Nagesh Salimath, Dr. Jitendra Sheetlani (2017). The Vulnerabilities of Cloud Computing: Security Threats. IOSR Journals (IOSR Journal of Computer Engineering), 19(2), 36-43. https://europub.co.uk./articles/-A-384468