ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Study of Security Risk and Vulnerabilities of Cloud Computing

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 490-496

Keywords : architectural component; cloud computing; security cloud; security risk; Vulnerability;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing has been developed to decrease IT expenses and to provide alert IT services to human being users as well as organizations. Cloud computing is dynamic in nature; that is elastic, scalable and multi-shared with high capability that gives an innovative shape of carrying out business. The estimation of cloud computing security impact is difficult for two main reasons. Primary, as is true for many discussions about basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were exchangeable, without observe to their particular definition. Secondary, not every concern that's raise is really particular to cloud computing. The important factor concerns are vulnerabilities. Cloud computing make assured well-understood vulnerabilities more significant and adds new vulnerabilities. Therefore we need to define cloud-specific vulnerabilities, cloud feature vulnerabilities and propose a reference vulnerabilities architecture of cloud computing. In this paper we have presented taxonomy of cloud computing vulnerabilities.

Last modified: 2014-02-25 02:42:36