Proactive Measures on Account Hijacking in Cloud Computing Network

  • Annie Christina A
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: amongst these security and trust issues, the user’s data has to be released to the cloud and thus leaves the protection sphere of the data owner. This paper focuses on various security issues arising from the usage of cloud services and especially hijacking of account/service the user of cloud computing arena. It also discusses basic proactive measures that can be taken to prevent or in other words minimize to the stealing of the user account details and services.

Cite

CITATION STYLE

APA

Annie Christina, A. (2015). Proactive Measures on Account Hijacking in Cloud Computing Network. Asian Journal of Computer Science and Technology, 4(2), 31–34. https://doi.org/10.51983/ajcst-2015.4.2.1753

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free