Full Paper View Go Back
Study of Threats, Risk and Challenges in Cloud Computing
R.Piplode 1 , P. Sharma2 , U.K. Singh3
Section:Review Paper, Product Type: Isroset-Journal
Vol.1 ,
Issue.1 , pp.26-30, Jan-2013
Online published on Dec 12, 2013
Copyright Š R.Piplode, P. Sharma , U.K. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R.Piplode, P. Sharma , U.K. Singh, âStudy of Threats, Risk and Challenges in Cloud Computing,â International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013.
MLA Style Citation: R.Piplode, P. Sharma , U.K. Singh "Study of Threats, Risk and Challenges in Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 1.1 (2013): 26-30.
APA Style Citation: R.Piplode, P. Sharma , U.K. Singh, (2013). Study of Threats, Risk and Challenges in Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 1(1), 26-30.
BibTex Style Citation:
@article{Sharma_2013,
author = {R.Piplode, P. Sharma , U.K. Singh},
title = {Study of Threats, Risk and Challenges in Cloud Computing},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2013},
volume = {1},
Issue = {1},
month = {1},
year = {2013},
issn = {2347-2693},
pages = {26-30},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=18},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=18
TI - Study of Threats, Risk and Challenges in Cloud Computing
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - R.Piplode, P. Sharma , U.K. Singh
PY - 2013
DA - 2012/12/12
PB - IJCSE, Indore, INDIA
SP - 26-30
IS - 1
VL - 1
SN - 2347-2693
ER -
Abstract :
Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper we present security issues that fetch by cloud computing technology and also analysis the threats, risk and challenges in cloud environment.
Key-Words / Index Term :
Cloud Computing, Security Risk, Service Models, Deployment Models
References :
[1] National Institute Of Standard and technology (2009). www.csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-v15.doc,
[2] Open Security Architecture http://www.opensecurityarchitecture.org/
[3] Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud Security and Privacy : An Enterprise perspective of Risks
[4] K.Mukherjee , G.Sahoo, âA Secure Cloud Computingâ, Proc. 2010 International Conference on Recent Trends in Information, Telecommunication and Computing
[5] KreĹĄimir Popović, Ĺ˝eljko Hocenski, âCloud computing security issues and challengesâ Proc. MIPRO 2010, May 24-28, 2010, Opatija, Croatia
[6] Cloud computing security retrived from
http://en.wikipedia.org/wiki/Cloud_computing _security
[7] Meiko Jensen, J¨org Schwenk, Nils Gruschka, Luigi Lo Iacono â On Technical Security Issues in Cloud Computingâ 2009 IEEE International Conference on Cloud Computing.
[8] Rituik Dubey, Muhammad Asim Jamshed, Xiaohui Wang, Rama Krishna Batalla âAddressing Security Issues in Cloud Computingâ.
[9] Shilpashree Srinivasamurthy, David Q. Liu, â Survey on Cloud Computing Securityâ.
[10] Salesforce, Salesforce.com, 2010
[11] Windows Azure, www.microsoft.com/azure, 2010
[12] Security Guidance for Critical Areas of Focus in Cloud Computing, April 2009. www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[13] Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina. Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control. CCSW `09: Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. November 2009.
[14] Steve Hanna. A security analysis of Cloud Computing. Cloud Computing Journal.
www.cloudcomputing.sys-con.com/node/1203943 .
[15] Matthew Glotzbach, Product Management Director, Google Enterprise, âWhat We Learned from 1 Million Businesses in the Cloud,â www.googleblog.blogspot.com/2008/10/whatwe-learned-from-1-illion.html, 30 Oct 2008.
[16] KrĂÂźgel, C., Toth, T., & Kirda, E. (2002). Service specific anomaly detection for network intrusion detection. In Proceedings of the 2002 ACM symposium on Applied computing (pp. 201-208). Madrid, Spain: ACM. Retrieved from www.portal.acm.org.library.capella.edu/citation.cfm?id=508835&dl=GUIDE&coll=GUIDE&CFID=80867670&CFTOKEN=24312614
[17] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, âSecurity Based Model for Cloud Computingâ, IRACSTâInternational Journal of Computer Networks and Wireless Communications (IJCNWC), Vol. 1, No. 1, pp(13-19), December 2011. http://www.iracst.org/ijcnwc/vol1no1.htm)
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.