Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Review on Security Risks Involved with Cloud Providers


Affiliations
1 MERI, India
     

   Subscribe/Renew Journal


Clouds provide a powerful computing platform that facilitates individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a "realistic" network environment. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. In previous years, the number of people using cloud services has drastically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, various security threats to the traditional systems and risks inherited to the virtual systems are examined. The latter half of the paper focus on the various information security threats an ITprofessional/firm should consider while deploying a cloud from the vendor and cloud service models are discussed.

Keywords

Cloud Computing, Virtualized Systems, Cloud Service Models.
User
Subscription Login to verify subscription
Notifications
Font Size

  • DataLossDB Open Security Foundation. http://datalossdb.org/statistics
  • Sophos Security Threat Report 2012. http://www.sophos.com/
  • D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures, ” International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-2676, April 2011.
  • . K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010.
  • W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii, January 2011.
  • M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference in Cloud Computing, pp. 109-116, Bangalore, 2009.

Abstract Views: 332

PDF Views: 5




  • A Review on Security Risks Involved with Cloud Providers

Abstract Views: 332  |  PDF Views: 5

Authors

Yugshakti
MERI, India

Abstract


Clouds provide a powerful computing platform that facilitates individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a "realistic" network environment. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. In previous years, the number of people using cloud services has drastically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, various security threats to the traditional systems and risks inherited to the virtual systems are examined. The latter half of the paper focus on the various information security threats an ITprofessional/firm should consider while deploying a cloud from the vendor and cloud service models are discussed.

Keywords


Cloud Computing, Virtualized Systems, Cloud Service Models.

References