A survey on top security threats in cloud computing
Journal article
Authors | Kazim, M. and Zhu, Shao Ying |
---|---|
Abstract | Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators. |
Keywords | Cloud computing; Data security; Network security; Cloud service providers |
Year | 2015 |
Journal | International Journal of Advanced Computer Science and Applications (IJACSA) |
Publisher | Science and Information (SAI) Organization Ltd. |
ISSN | 2158-107X |
2156-5570 | |
Digital Object Identifier (DOI) | https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf |
Web address (URL) | http://hdl.handle.net/10545/620916 |
hdl:10545/620916 | |
Publication dates | 2015 |
Publication process dates | |
Deposited | 21 Nov 2016, 11:10 |
Contributors | University of Derby |
File | File Access Level Open |
File | File Access Level Open |
File | File Access Level Open |
https://repository.derby.ac.uk/item/9475q/a-survey-on-top-security-threats-in-cloud-computing
Download files
329
total views176
total downloads33
views this month17
downloads this month