Abstract
Cloud computing provides scalable, on-demand, and highly available computing resources via the internet to both the public and private on a pay-per-use basis. It eliminates the requirement of purchasing new hardware and software licenses besides reducing administration efforts. The key issue of cloud computing is the security of its resources and data and need to be protected from different attacks. Different research studies have been proposed various methods for intrusion detection and prevention. Thus, two major threats techniques have been defined and addressed, signature technique and anomaly technique. In this paper, an advanced classification has been identified with describing the advantages and limitations of each method to support the researchers with well-organized roadmap to deal with these attacks.
Author supplied keywords
Cite
CITATION STYLE
Alturfi, S. M., Al-Musawi, B., & Marhoon, H. A. (2020). An advanced classification of cloud computing security techniques: A survey. In AIP Conference Proceedings (Vol. 2290). American Institute of Physics Inc. https://doi.org/10.1063/5.0027355
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.