An advanced classification of cloud computing security techniques: A survey

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing provides scalable, on-demand, and highly available computing resources via the internet to both the public and private on a pay-per-use basis. It eliminates the requirement of purchasing new hardware and software licenses besides reducing administration efforts. The key issue of cloud computing is the security of its resources and data and need to be protected from different attacks. Different research studies have been proposed various methods for intrusion detection and prevention. Thus, two major threats techniques have been defined and addressed, signature technique and anomaly technique. In this paper, an advanced classification has been identified with describing the advantages and limitations of each method to support the researchers with well-organized roadmap to deal with these attacks.

Cite

CITATION STYLE

APA

Alturfi, S. M., Al-Musawi, B., & Marhoon, H. A. (2020). An advanced classification of cloud computing security techniques: A survey. In AIP Conference Proceedings (Vol. 2290). American Institute of Physics Inc. https://doi.org/10.1063/5.0027355

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free