Abstract
Cloud computing has been envisioned as the next generation architecture of IT Enterprises. It offers great potential to improve productivity and reduce costs. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood yet. In this paper we investigate some prime security attacks on clouds: Wrapping attacks, Malware-Injection attacks and Flooding attacks, and the accountability needed due to these attacks. The focus of this paper is to identify and describe these prime attacks with the goal of providing theoretical solutions for individual problems and to integrate these solutions.
Cite
CITATION STYLE
Singh, S. (2014). Security in Cloud Computing. International Journal of Computer Applications Technology and Research, 3(8), 488–493. https://doi.org/10.7753/ijcatr0308.1001
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.