Security in Cloud Computing

  • Singh S
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing has been envisioned as the next generation architecture of IT Enterprises. It offers great potential to improve productivity and reduce costs. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood yet. In this paper we investigate some prime security attacks on clouds: Wrapping attacks, Malware-Injection attacks and Flooding attacks, and the accountability needed due to these attacks. The focus of this paper is to identify and describe these prime attacks with the goal of providing theoretical solutions for individual problems and to integrate these solutions.

Cite

CITATION STYLE

APA

Singh, S. (2014). Security in Cloud Computing. International Journal of Computer Applications Technology and Research, 3(8), 488–493. https://doi.org/10.7753/ijcatr0308.1001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free