Securing the Cloud: Threats, Attacks and Mitigation Techniques

  • Alani M
N/ACitations
Citations of this article
68Readers
Mendeley users who have this article in their library.

Abstract

This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper also suggests mitigation techniques that can be used to reduce or eliminate the risk of the threats discussed. In addition, general cloud security recommendations are given.Keywords: cloud, cloud computing, security, threats, attacks, SaaS, PaaS, IaaS.

Cite

CITATION STYLE

APA

Alani, M. M. (2014). Securing the Cloud: Threats, Attacks and Mitigation Techniques. Journal of Advanced Computer Science & Technology, 3(2), 202–213. https://doi.org/10.14419/jacst.v3i2.3588

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free