Study of Security Risk and Vulnerabilities of Cloud Computing
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : Dr.P.K.Rai R.K.Bunkar;
Page : 490-496
Keywords : architectural component; cloud computing; security cloud; security risk; Vulnerability;
Abstract
Cloud computing has been developed to decrease IT expenses and to provide alert IT services to human being users as well as organizations. Cloud computing is dynamic in nature; that is elastic, scalable and multi-shared with high capability that gives an innovative shape of carrying out business. The estimation of cloud computing security impact is difficult for two main reasons. Primary, as is true for many discussions about basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were exchangeable, without observe to their particular definition. Secondary, not every concern that's raise is really particular to cloud computing. The important factor concerns are vulnerabilities. Cloud computing make assured well-understood vulnerabilities more significant and adds new vulnerabilities. Therefore we need to define cloud-specific vulnerabilities, cloud feature vulnerabilities and propose a reference vulnerabilities architecture of cloud computing. In this paper we have presented taxonomy of cloud computing vulnerabilities.
Other Latest Articles
- JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING?
- PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS?
- AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM?
- Privacy in Map Reduce Based Systems: A Review
- ADDRESSING BIG DATA WITH HADOOP?
Last modified: 2014-02-25 02:42:36