Hdl Handle:
http://hdl.handle.net/10545/620916
Title:
A survey on top security threats in cloud computing
Authors:
Kazim, Muhammad; Zhu, Shao Ying
Abstract:
Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.
Affiliation:
University of Derby
Citation:
Kazim, M. and Zhu, S. Y. (2015) “A survey on top security threats in cloud computing” International Journal of Advanced Computer Science and Applications(IJACSA), 6(3). DOI: 10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf
Publisher:
Science and Information (SAI) Organization Ltd.
Journal:
International Journal of Advanced Computer Science and Applications (IJACSA)
Issue Date:
2015
URI:
http://hdl.handle.net/10545/620916
DOI:
10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf
Additional Links:
http://thesai.org/Publications/ViewPaper?Volume=6&Issue=3&Code=IJACSA&SerialNo=16
Type:
Article
Language:
en
ISSN:
2158-107X
EISSN:
2156-5570
Appears in Collections:
Department of Electronics, Computing & Maths

Full metadata record

DC FieldValue Language
dc.contributor.authorKazim, Muhammaden
dc.contributor.authorZhu, Shao Yingen
dc.date.accessioned2016-11-21T11:10:54Z-
dc.date.available2016-11-21T11:10:54Z-
dc.date.issued2015-
dc.identifier.citationKazim, M. and Zhu, S. Y. (2015) “A survey on top security threats in cloud computing” International Journal of Advanced Computer Science and Applications(IJACSA), 6(3). DOI: 10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpufen
dc.identifier.issn2158-107X-
dc.identifier.doi10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf-
dc.identifier.urihttp://hdl.handle.net/10545/620916-
dc.description.abstractCloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.en
dc.language.isoenen
dc.publisherScience and Information (SAI) Organization Ltd.en
dc.relation.urlhttp://thesai.org/Publications/ViewPaper?Volume=6&Issue=3&Code=IJACSA&SerialNo=16en
dc.subjectCloud computingen
dc.subjectData securityen
dc.subjectNetwork securityen
dc.subjectCloud service providersen
dc.titleA survey on top security threats in cloud computingen
dc.typeArticleen
dc.identifier.eissn2156-5570-
dc.contributor.departmentUniversity of Derbyen
dc.identifier.journalInternational Journal of Advanced Computer Science and Applications (IJACSA)en
This item is licensed under a Creative Commons License
Creative Commons
All Items in UDORA are protected by copyright, with all rights reserved, unless otherwise indicated.