SlideShare a Scribd company logo
1 of 8
Download to read offline
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
1
A Survey of Cloud Computing Security Issues and Consequences
Nandhini K.1
& R.Venkatesh2
1
PG Student, 2
Associate Professor, Department of Computer Science & Engineering, Sri Shakthi Institute of Engineering and
Technology (Autonomous), Coimbatore, Tamil Nadu, India.
DOI: 10.38177/ajast.2020.4301
Article Received: 10 April 2020 Article Accepted: 05 June 2020 Article Published: 20 July 2020
1. Introduction
Improvement of many procured advances and advances to registering into something other than what's expected is
summed up in a "Cloud computing" or "cloud" term which disengages essential foundation from application and
data assets, and the components used to convey them. Cloud improves cooperation, action, scaling, and
accessibility, and causes to decrease the cost under the aegis of enhanced and proficient processing. Particularly,
the cloud portrays the utilization of an assortment of administrations, applications, data, and framework comprised
of pools of the figure, system, data, and capacity assets [2]. Orchestrating, planning, achieving, and
decommissioning and scaling up or down are quickly performed on referenced constituents and they are provided
for an on-request utility-like model of assignment and utilization. Proximity and a decent variety of cloud from
present models of processing are so bewildering, thinking about design perspective; furthermore, there are a lot of
inquiries concerning their impacts on the authoritative, operational, and mechanical capacities to network and data
security models. Today academicians, engineers, designers, supervisors, and clients all have their particular
portrayal for the cloud [5].
Distributed computing doesn't have a typically acknowledged definition yet. The National Institute of Standards
and Technology (NIST) characterized five fundamental qualities of distributed computing, to be specific:
on-request self-administration, huge system access, asset pooling, quick versatility or development, and estimated
administration. Likewise, cloud computing is depicted as a dynamic and regularly handily stretched out stage to
give straightforward virtualized assets to clients through the Internet. Cloud computing engineering comprises
three layers:
(i) Software as a Service (SaaS)
(ii) Platform as a Service (PaaS) and
ABSTRACT
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively.
The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the
area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets
that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps
keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of
on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation;
it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection
concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the
solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints
are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among
them are identified.
Keywords: Cloud computing, Security, Threats, Attacks.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
2
Figure No: 1 Cloud Deployment Models and Infrastructure
(iii) Infrastructure as a Service (IaaS).
The clouds are likewise seen as five-part structures that include customers, applications, stages, framework, and
servers.
The present clouds are sent in one of four sending models:
(a) Open clouds in which the physical foundation is possessed and overseen by the specialist co-op. (b) Network
clouds in which the physical framework is claimed and overseen by a consortium of associations. (c) Private clouds
in which the framework is claimed and overseen by a particular association. (d) Hybrid clouds which incorporate
blends of the past three models. Figure 1 shows cloud arrangement models together with their interior framework
(IaaS, PaaS and SaaS). Cloud arrangement models have the comparative interior framework, yet fluctuate in their
strategies and client get to levels.
Cloud computing is one of the present most
energizing innovations as a result of its ability to
diminish costs related to computation while at the
same time expanding adaptability and versatility
for PC forms. In the previous years, cloud
computing is being developed from promising
business and thought to one of the quickest
developing segments of the IT business [1]. In
any case, IT associations have communicated
troubles about basic issues, for example, security
that goes with them across the board execution of
cloud computing. Security, specifically, is one of
the most discussed issues in the field of cloud
computing and a few endeavors see distributed
computing attentively because of anticipated security dangers. Additionally, there are two different issues. They are
the unwavering quality and accessibility of the cloud which are as significant as security. Even though every one of
those three issues is related to the utilization of the cloud, they will have various degrees of significance.
Assessment of the advantages and dangers of distributed computing is vital for a full assessment of the practicality
of distributed computing. This work depicts the issues and difficulties of cloud computing are dependability,
accessibility, and security.
2. Cloud Computing Issues and Attacks
The cloud computing security-related issues are characterized into the accompanying five classes, which are
likewise summed up. A comparable way to deal with characterizing the issues is found however it is constrained to
the little arrangement of cloud security concerns and just in part covers various classifications.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
3
1) The Security Standards classification manages administrative specialists and governing bodies that
characterize cloud security arrangements to guarantee a secure workplace over the clouds. It incorporates
administration level, inspecting, and different understandings among clients, specialist organizations, and
different partners.
2) The Network classification alludes to the medium through which the clients associate with the cloud framework
to play out with the ideal calculations. It incorporates programs, associations, and data trade through enlistment.
3) The Access Control classification is a client situated class and incorporates identifiable proof, verification, and
approval issues.
4) The Cloud Infrastructure classification incorporates security issues inside SaaS, PaaS, and IaaS and is specially
related to virtualization conditions.
5) The Data class covers information security and secrecy issues.
Exceptional consideration is required towards shared security principles, for example, Secure Sockets Layer
(SSL)/Transport Layer Security (TLS), XML signature, XML Encryption Syntax and Processing, and Key
Management Interoperability Protocols. At present, cloud computing needs proper security norms [4].
Regardless of whether security norms are characterized appropriately, numerous security issues are still connected
with consistent chances because of the absence of a governess for reviews and corporate standard assessments.
Cloud clients need more information on systems, procedures, and practices of the supplier, and isolation of
obligations.
When the service provider re-appropriates the support of an outsider where usefulness isn't straightforward, clients
must have the option to review the entire procedure. Security principles and administering bodies are a piece of
service level agreement (SLA) and lawful viewpoints, separately which have not been taken into rehearses for
cloud computing. The client may endure if there should arise an occurrence of information misfortune if the above
elements are not taken for granted as he will be unable to put asserts on service providers.
Network classification-related issues are considered to be the greatest security challenges in clouds since cloud
computing is progressively inclined to organize related assaults contrasted with the conventional figuring
standards. Furthermore, cloud activities are firmly coupled and profoundly rely upon systems administration.
Accordingly, cloud security issues get more consideration in this work contrasted with the other security classes.
Security specialists foresee that clouds will be the focal point of programmers in the future because of the grouping
of important "resources" (information and calculation) inside the mists [6].
The conceivable absence of appropriate establishments of system firewalls and the neglected security designs
inside clouds and on systems, make it simpler for programmers to get to the cloud for genuine clients. Programmers
can possess assets (equipment or application) by producing false information or they can run pernicious code on the
commandeered assets. Denial of service can be propelled by first recognizing vulnerabilities in Internet
conventions, for example, SIP (Session Initiation Protocol) which could esteem the Internet to be un-trusted.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
4
Account and Service hijacking include phishing, misrepresentation, and programming vulnerabilities where
aggressors take certifications and increase unapproved access to servers. This unapproved access is a danger to
respectability, secrecy, and accessibility of information and administrations. Unapproved access can be propelled
from inside or outside the association. Noxious insiders, for example, untrustworthy heads seriously sway
associations' security. Given their degree of access, they penetrate corporate and cause brand harm, money related,
and efficiency misfortunes. In this manner, it is basic for cloud clients to decide that the cloud suppliers use to
identify and shield against insider dangers.
The present validation instruments may not be material in cloud situations as clients no longer have a place with or
can get to a solitary firmly controlled framework [3]. A solitary client may have access to information and form
administrations from different cloud suppliers utilizing a versatile application or a program.
This sort of access acquires a characteristic degree of hazard and this hazard has been called advantaged client
access. Unapproved access gets conceivable through program vulnerabilities. Also, the Internet program is the
main stage where safety efforts ought to be considered that vulnerabilities in the program open the entryway for
some follow-on assaults. The unreliable interface of Application Programming Interface (API) issue covers the
vulnerabilities in the arrangement of APIs in the cloud entryway (clients utilize these APIs to associate with a
cloud) which can open an association to a few dangers, for example, unapproved access, and content transmission,
reusable token and logging capacities.
A large portion of cloud sellers erroneously guarantees to give secure information and computational situations for
cloud clients. It may tend to be reasonable, aggregate endeavors are required at more significant levels (e.g.,
overseeing bodies) rather than leaving it to singular associations. The present work helps in accomplishing the
objectives by giving an extensive investigation of the assaults against clouds, setting up conditions among different
assaults, and connecting assaults to vulnerabilities across different cloud parts. This examination can bolster the
undertakings to give preventive measures just as proactive apparatuses in protecting the clouds.
Utilizing this examination, it is found that information and framework security ought to be inserted in the plan of
cloud design to accomplish better security. Also, safety efforts ought to be dynamic and self-governing. The cloud
computing foundation is changing quickly requiring safety efforts and approaches to be refreshed routinely at a
similar pace to coordinate the changing conduct of the clouds. Besides, authorizing is urgent to the security of
clouds.
Standard arrangements ought to be carefully executed in clouds and hierarchical/administering bodies should visit
clouds' framework to assess the proficiency of the security safety measures received by the sellers. The insights for
assaults, happening in any cloud, ought to be publically accessible to decide the unwavering quality of cloud
merchants.
3. Results and Discussions
Cloud computing is enriched with enormous issues such as reliability, maltreatment, malicious attacks, availability,
vulnerabilities due to shared technology, traffic skyjack and data leakage. The most important part is privacy and
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
5
security which is required for the cloud provider. The attacks are also given and at the same time solutions to those
problems are included in table 1.
The aggregation of privacy and security is necessary for many enterprises because they store their confidential
information onto the cloud. The performance may not be a critical requirement for many users. The cloud providers
must ensure security and reliability to meets the needs of the enterprise.
Table No: 1 Comparative Analysis of Cloud Computing Attacks, Consequences, Solutions
S.No Attacks Consequences Solutions
1
Maltreatment and Wicked
Usage of Cloud Computing
The spam and malware are made to
spread by botnets. The path is found
by the intruder to transmit the
malware to numerous PC’s. The
cloud infrastructure’s power is
utilized by the attackers to assault
the other PC’s in the network.
Infrastructure based security,
Access control and Identity
management.
2 Malicious Attackers
The attacker aims to generate
malicious software which is
entrenched on other’s machine.
Despite their knowledge, the
intruder takes the privilege by
damaging the system for the
financial commotion.
Storage and Information
security management. Also,
the privacy management
plays a major role.
3
Usage of apprehensive
Application Programming
Interfaces
The clients often communicate with
the cloud by the usage of APIs. The
attacker tries to analyze the
encryption pattern of both the
sender and receiver. Also, the
activities of the clients are captured
by the intruders.
Authentication management,
Access control and security
management.
4
Vulnerabilities of Shared
Technology
Various virtual machines access is
attacked by the intruders. The
intruders have the capability of
Defense-in-Depth
technology and layers of
virtualization.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
6
utilizing the entire computing
resources that applies to other
machines.
5 Information Leakage or Loss
The illegal access attempts to
remove the data before any
backups. The attacker also tries to
obtain the encoded key.
Access Control, Encryption
algorithms and Privacy
management.
6
Privacy, Account and Traffic
Skyjack
Denial of service attacks, a man in
the middle attacks and phishing
attacks took place.
Authentication mechanism,
security policies for
providers and proactive
monitoring.
7 Unknown Profile
The attacker aims to attain the
security policies and the update of
the code.
Infrastructure management
and monitoring and alert
management.
8 Provider Security Failure
The intruder attempts to manage the
hardware. He also tries to supervise
the stored data and process the
application.
Authentication mechanism
and Security management.
9 Other Client Attacks
Once the interface among the clients
breaks down then other client aims
to get the other client’s information
or attempts to obstruct the other
applications.
Privacy management and
information security
management.
10
Reliability and Availability
Issues
The intruder acts as a cloud provider
and executes a hosted application
for broadcasting accurate results.
Maintenance and Privacy
mechanism.
11 Virtual Machine Attacks
The attackers will hack the
resources in a multi-tenant
architecture. The intruders will
enhance or minimize the VM's.
Authorization and
authentication mechanism.
12
Distributed Denial of Service
Attacks
Botnets have introduced with a
large number of virtual machines. It
also transmits the huge packet
Data storage and backup.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
7
traffic from various sources to a
web server.
13 Intrusion Attack in SaaS
The attackers will obtain the system
logs and the custom application is
monitored by the intruders.
Host-Based and
Network-Based Intrusion
detection system
14 Intrusion Attack in PaaS
Close to SaaS. The difference is the
system is embedded on the
centralized server.
15 Intrusion Attack in IaaS
Transparency is an important
dispute in IaaS.
16 Regulatory issues
Jurisdiction as well as data export
issues externally.
Security management.
17 Perimeter Security Attacks
The most critical application is
attacked by the intruders.
Security and Privacy
Management.
4. Conclusion
IT enterprises need the concept of cloud computing in a cost-effective approach. In this work, the various types of
attacks, consequences and the solutions are analyzed. The solutions are effective in solving the attacks. Each
method helps in solving the attacks created by intruders. Still, the method of cloud computing is embedded with
positive and negative things that are developed for a large scale enterprise. Nowadays the total number of intruder
attacks has been increased. By protecting the information and cloud infrastructure, cloud security can be attained
against various attacks. The attacks such as known and unknown attacks still exist in the infrastructure of cloud
computing and it may not be identified and protected. This happens because of the computation overhead. The
existing solutions like firewalls, antivirus installation may be very expensive and also the network performance can
be degraded. Hence the work not only relies upon security and also the method must involve a low amount of
resources as well as minimal degradation in the performance. The current survey achieves the solutions by
affording various solutions to the attacks and its consequences. By utilizing this survey, information and system
security must be entrenched in the cloud architecture design to afford the utmost security.
References
[1] Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE
International Conference on Signal Processing, Communications and Computing (ICSPCC), Xi’an, China, 14–16
September 2011; pp. 1–5.
Asian Journal of Applied Science and Technology
Volume 4, Issue 3, Pages 01-08, July-September 2020
ISSN: 2456-883X www.ajast.net
8
[2] Wang, J.-J.; Mu, S. Security issues and countermeasures in cloud computing. In Proceedings of the 2011 IEEE
International Conference on Grey Systems and Intelligent Services (GSIS), Nanjing, China, 15–18 September
2011; pp. 843–846.
[3] Jain, P.; Rane, D.; Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud
bursting and aggregation in renal environment. In Proceedings of the 2011 World Congress on Information and
Communication Technologies (WICT), Mumbai, India, 11– 14 December 2011; pp. 456–461.
[4] Samarati, P.; di Vimercati, S.D.C. Data protection in outsourcing scenarios: Issues and directions. In
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS
’10), Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA, 2010; pp. 1–14.
[5] Popovic, O.; Jovanovic, Z.; Jovanovic, N.; Popovic, R. A comparison and security analysis of the cloud
computing software platforms. In Proceedings of the 2011 10th International Conference on Telecommunication in
Modern Satellite Cable and Broadcasting Services (TELSIKS), Nis, Serbia, 5–8 October 2011; Volume 2, pp.
632–634.
[6] Kandukuri, B.R.; Paturi, V.R.; Rakshit, A. Cloud security issues. In Proceedings of the IEEE International
Conference on Services Computing, 2009 (SCC ’09), Bangalore, India, 21–25 September 2009; pp. 517–520.

More Related Content

What's hot

Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture IJECEIAES
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditingijtsrd
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 

What's hot (19)

Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 

Similar to A Survey of Cloud Computing Security Issues and Consequences

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYEditor Jacotech
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...Claire Webber
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

Similar to A Survey of Cloud Computing Security Issues and Consequences (20)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
G0314043
G0314043G0314043
G0314043
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

More from Associate Professor in VSB Coimbatore

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Associate Professor in VSB Coimbatore
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Associate Professor in VSB Coimbatore
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Associate Professor in VSB Coimbatore
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionAssociate Professor in VSB Coimbatore
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Associate Professor in VSB Coimbatore
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...Associate Professor in VSB Coimbatore
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...Associate Professor in VSB Coimbatore
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Associate Professor in VSB Coimbatore
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Associate Professor in VSB Coimbatore
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Associate Professor in VSB Coimbatore
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Associate Professor in VSB Coimbatore
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Associate Professor in VSB Coimbatore
 

More from Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

A Survey of Cloud Computing Security Issues and Consequences

  • 1. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 1 A Survey of Cloud Computing Security Issues and Consequences Nandhini K.1 & R.Venkatesh2 1 PG Student, 2 Associate Professor, Department of Computer Science & Engineering, Sri Shakthi Institute of Engineering and Technology (Autonomous), Coimbatore, Tamil Nadu, India. DOI: 10.38177/ajast.2020.4301 Article Received: 10 April 2020 Article Accepted: 05 June 2020 Article Published: 20 July 2020 1. Introduction Improvement of many procured advances and advances to registering into something other than what's expected is summed up in a "Cloud computing" or "cloud" term which disengages essential foundation from application and data assets, and the components used to convey them. Cloud improves cooperation, action, scaling, and accessibility, and causes to decrease the cost under the aegis of enhanced and proficient processing. Particularly, the cloud portrays the utilization of an assortment of administrations, applications, data, and framework comprised of pools of the figure, system, data, and capacity assets [2]. Orchestrating, planning, achieving, and decommissioning and scaling up or down are quickly performed on referenced constituents and they are provided for an on-request utility-like model of assignment and utilization. Proximity and a decent variety of cloud from present models of processing are so bewildering, thinking about design perspective; furthermore, there are a lot of inquiries concerning their impacts on the authoritative, operational, and mechanical capacities to network and data security models. Today academicians, engineers, designers, supervisors, and clients all have their particular portrayal for the cloud [5]. Distributed computing doesn't have a typically acknowledged definition yet. The National Institute of Standards and Technology (NIST) characterized five fundamental qualities of distributed computing, to be specific: on-request self-administration, huge system access, asset pooling, quick versatility or development, and estimated administration. Likewise, cloud computing is depicted as a dynamic and regularly handily stretched out stage to give straightforward virtualized assets to clients through the Internet. Cloud computing engineering comprises three layers: (i) Software as a Service (SaaS) (ii) Platform as a Service (PaaS) and ABSTRACT The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified. Keywords: Cloud computing, Security, Threats, Attacks.
  • 2. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 2 Figure No: 1 Cloud Deployment Models and Infrastructure (iii) Infrastructure as a Service (IaaS). The clouds are likewise seen as five-part structures that include customers, applications, stages, framework, and servers. The present clouds are sent in one of four sending models: (a) Open clouds in which the physical foundation is possessed and overseen by the specialist co-op. (b) Network clouds in which the physical framework is claimed and overseen by a consortium of associations. (c) Private clouds in which the framework is claimed and overseen by a particular association. (d) Hybrid clouds which incorporate blends of the past three models. Figure 1 shows cloud arrangement models together with their interior framework (IaaS, PaaS and SaaS). Cloud arrangement models have the comparative interior framework, yet fluctuate in their strategies and client get to levels. Cloud computing is one of the present most energizing innovations as a result of its ability to diminish costs related to computation while at the same time expanding adaptability and versatility for PC forms. In the previous years, cloud computing is being developed from promising business and thought to one of the quickest developing segments of the IT business [1]. In any case, IT associations have communicated troubles about basic issues, for example, security that goes with them across the board execution of cloud computing. Security, specifically, is one of the most discussed issues in the field of cloud computing and a few endeavors see distributed computing attentively because of anticipated security dangers. Additionally, there are two different issues. They are the unwavering quality and accessibility of the cloud which are as significant as security. Even though every one of those three issues is related to the utilization of the cloud, they will have various degrees of significance. Assessment of the advantages and dangers of distributed computing is vital for a full assessment of the practicality of distributed computing. This work depicts the issues and difficulties of cloud computing are dependability, accessibility, and security. 2. Cloud Computing Issues and Attacks The cloud computing security-related issues are characterized into the accompanying five classes, which are likewise summed up. A comparable way to deal with characterizing the issues is found however it is constrained to the little arrangement of cloud security concerns and just in part covers various classifications.
  • 3. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 3 1) The Security Standards classification manages administrative specialists and governing bodies that characterize cloud security arrangements to guarantee a secure workplace over the clouds. It incorporates administration level, inspecting, and different understandings among clients, specialist organizations, and different partners. 2) The Network classification alludes to the medium through which the clients associate with the cloud framework to play out with the ideal calculations. It incorporates programs, associations, and data trade through enlistment. 3) The Access Control classification is a client situated class and incorporates identifiable proof, verification, and approval issues. 4) The Cloud Infrastructure classification incorporates security issues inside SaaS, PaaS, and IaaS and is specially related to virtualization conditions. 5) The Data class covers information security and secrecy issues. Exceptional consideration is required towards shared security principles, for example, Secure Sockets Layer (SSL)/Transport Layer Security (TLS), XML signature, XML Encryption Syntax and Processing, and Key Management Interoperability Protocols. At present, cloud computing needs proper security norms [4]. Regardless of whether security norms are characterized appropriately, numerous security issues are still connected with consistent chances because of the absence of a governess for reviews and corporate standard assessments. Cloud clients need more information on systems, procedures, and practices of the supplier, and isolation of obligations. When the service provider re-appropriates the support of an outsider where usefulness isn't straightforward, clients must have the option to review the entire procedure. Security principles and administering bodies are a piece of service level agreement (SLA) and lawful viewpoints, separately which have not been taken into rehearses for cloud computing. The client may endure if there should arise an occurrence of information misfortune if the above elements are not taken for granted as he will be unable to put asserts on service providers. Network classification-related issues are considered to be the greatest security challenges in clouds since cloud computing is progressively inclined to organize related assaults contrasted with the conventional figuring standards. Furthermore, cloud activities are firmly coupled and profoundly rely upon systems administration. Accordingly, cloud security issues get more consideration in this work contrasted with the other security classes. Security specialists foresee that clouds will be the focal point of programmers in the future because of the grouping of important "resources" (information and calculation) inside the mists [6]. The conceivable absence of appropriate establishments of system firewalls and the neglected security designs inside clouds and on systems, make it simpler for programmers to get to the cloud for genuine clients. Programmers can possess assets (equipment or application) by producing false information or they can run pernicious code on the commandeered assets. Denial of service can be propelled by first recognizing vulnerabilities in Internet conventions, for example, SIP (Session Initiation Protocol) which could esteem the Internet to be un-trusted.
  • 4. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 4 Account and Service hijacking include phishing, misrepresentation, and programming vulnerabilities where aggressors take certifications and increase unapproved access to servers. This unapproved access is a danger to respectability, secrecy, and accessibility of information and administrations. Unapproved access can be propelled from inside or outside the association. Noxious insiders, for example, untrustworthy heads seriously sway associations' security. Given their degree of access, they penetrate corporate and cause brand harm, money related, and efficiency misfortunes. In this manner, it is basic for cloud clients to decide that the cloud suppliers use to identify and shield against insider dangers. The present validation instruments may not be material in cloud situations as clients no longer have a place with or can get to a solitary firmly controlled framework [3]. A solitary client may have access to information and form administrations from different cloud suppliers utilizing a versatile application or a program. This sort of access acquires a characteristic degree of hazard and this hazard has been called advantaged client access. Unapproved access gets conceivable through program vulnerabilities. Also, the Internet program is the main stage where safety efforts ought to be considered that vulnerabilities in the program open the entryway for some follow-on assaults. The unreliable interface of Application Programming Interface (API) issue covers the vulnerabilities in the arrangement of APIs in the cloud entryway (clients utilize these APIs to associate with a cloud) which can open an association to a few dangers, for example, unapproved access, and content transmission, reusable token and logging capacities. A large portion of cloud sellers erroneously guarantees to give secure information and computational situations for cloud clients. It may tend to be reasonable, aggregate endeavors are required at more significant levels (e.g., overseeing bodies) rather than leaving it to singular associations. The present work helps in accomplishing the objectives by giving an extensive investigation of the assaults against clouds, setting up conditions among different assaults, and connecting assaults to vulnerabilities across different cloud parts. This examination can bolster the undertakings to give preventive measures just as proactive apparatuses in protecting the clouds. Utilizing this examination, it is found that information and framework security ought to be inserted in the plan of cloud design to accomplish better security. Also, safety efforts ought to be dynamic and self-governing. The cloud computing foundation is changing quickly requiring safety efforts and approaches to be refreshed routinely at a similar pace to coordinate the changing conduct of the clouds. Besides, authorizing is urgent to the security of clouds. Standard arrangements ought to be carefully executed in clouds and hierarchical/administering bodies should visit clouds' framework to assess the proficiency of the security safety measures received by the sellers. The insights for assaults, happening in any cloud, ought to be publically accessible to decide the unwavering quality of cloud merchants. 3. Results and Discussions Cloud computing is enriched with enormous issues such as reliability, maltreatment, malicious attacks, availability, vulnerabilities due to shared technology, traffic skyjack and data leakage. The most important part is privacy and
  • 5. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 5 security which is required for the cloud provider. The attacks are also given and at the same time solutions to those problems are included in table 1. The aggregation of privacy and security is necessary for many enterprises because they store their confidential information onto the cloud. The performance may not be a critical requirement for many users. The cloud providers must ensure security and reliability to meets the needs of the enterprise. Table No: 1 Comparative Analysis of Cloud Computing Attacks, Consequences, Solutions S.No Attacks Consequences Solutions 1 Maltreatment and Wicked Usage of Cloud Computing The spam and malware are made to spread by botnets. The path is found by the intruder to transmit the malware to numerous PC’s. The cloud infrastructure’s power is utilized by the attackers to assault the other PC’s in the network. Infrastructure based security, Access control and Identity management. 2 Malicious Attackers The attacker aims to generate malicious software which is entrenched on other’s machine. Despite their knowledge, the intruder takes the privilege by damaging the system for the financial commotion. Storage and Information security management. Also, the privacy management plays a major role. 3 Usage of apprehensive Application Programming Interfaces The clients often communicate with the cloud by the usage of APIs. The attacker tries to analyze the encryption pattern of both the sender and receiver. Also, the activities of the clients are captured by the intruders. Authentication management, Access control and security management. 4 Vulnerabilities of Shared Technology Various virtual machines access is attacked by the intruders. The intruders have the capability of Defense-in-Depth technology and layers of virtualization.
  • 6. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 6 utilizing the entire computing resources that applies to other machines. 5 Information Leakage or Loss The illegal access attempts to remove the data before any backups. The attacker also tries to obtain the encoded key. Access Control, Encryption algorithms and Privacy management. 6 Privacy, Account and Traffic Skyjack Denial of service attacks, a man in the middle attacks and phishing attacks took place. Authentication mechanism, security policies for providers and proactive monitoring. 7 Unknown Profile The attacker aims to attain the security policies and the update of the code. Infrastructure management and monitoring and alert management. 8 Provider Security Failure The intruder attempts to manage the hardware. He also tries to supervise the stored data and process the application. Authentication mechanism and Security management. 9 Other Client Attacks Once the interface among the clients breaks down then other client aims to get the other client’s information or attempts to obstruct the other applications. Privacy management and information security management. 10 Reliability and Availability Issues The intruder acts as a cloud provider and executes a hosted application for broadcasting accurate results. Maintenance and Privacy mechanism. 11 Virtual Machine Attacks The attackers will hack the resources in a multi-tenant architecture. The intruders will enhance or minimize the VM's. Authorization and authentication mechanism. 12 Distributed Denial of Service Attacks Botnets have introduced with a large number of virtual machines. It also transmits the huge packet Data storage and backup.
  • 7. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 7 traffic from various sources to a web server. 13 Intrusion Attack in SaaS The attackers will obtain the system logs and the custom application is monitored by the intruders. Host-Based and Network-Based Intrusion detection system 14 Intrusion Attack in PaaS Close to SaaS. The difference is the system is embedded on the centralized server. 15 Intrusion Attack in IaaS Transparency is an important dispute in IaaS. 16 Regulatory issues Jurisdiction as well as data export issues externally. Security management. 17 Perimeter Security Attacks The most critical application is attacked by the intruders. Security and Privacy Management. 4. Conclusion IT enterprises need the concept of cloud computing in a cost-effective approach. In this work, the various types of attacks, consequences and the solutions are analyzed. The solutions are effective in solving the attacks. Each method helps in solving the attacks created by intruders. Still, the method of cloud computing is embedded with positive and negative things that are developed for a large scale enterprise. Nowadays the total number of intruder attacks has been increased. By protecting the information and cloud infrastructure, cloud security can be attained against various attacks. The attacks such as known and unknown attacks still exist in the infrastructure of cloud computing and it may not be identified and protected. This happens because of the computation overhead. The existing solutions like firewalls, antivirus installation may be very expensive and also the network performance can be degraded. Hence the work not only relies upon security and also the method must involve a low amount of resources as well as minimal degradation in the performance. The current survey achieves the solutions by affording various solutions to the attacks and its consequences. By utilizing this survey, information and system security must be entrenched in the cloud architecture design to afford the utmost security. References [1] Tripathi, A.; Mishra, A. Cloud computing security considerations. In Proceedings of the 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xi’an, China, 14–16 September 2011; pp. 1–5.
  • 8. Asian Journal of Applied Science and Technology Volume 4, Issue 3, Pages 01-08, July-September 2020 ISSN: 2456-883X www.ajast.net 8 [2] Wang, J.-J.; Mu, S. Security issues and countermeasures in cloud computing. In Proceedings of the 2011 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), Nanjing, China, 15–18 September 2011; pp. 843–846. [3] Jain, P.; Rane, D.; Patidar, S. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment. In Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, 11– 14 December 2011; pp. 456–461. [4] Samarati, P.; di Vimercati, S.D.C. Data protection in outsourcing scenarios: Issues and directions. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), Chicago, IL, USA, 4–8 October 2010; ACM: New York, NY, USA, 2010; pp. 1–14. [5] Popovic, O.; Jovanovic, Z.; Jovanovic, N.; Popovic, R. A comparison and security analysis of the cloud computing software platforms. In Proceedings of the 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS), Nis, Serbia, 5–8 October 2011; Volume 2, pp. 632–634. [6] Kandukuri, B.R.; Paturi, V.R.; Rakshit, A. Cloud security issues. In Proceedings of the IEEE International Conference on Services Computing, 2009 (SCC ’09), Bangalore, India, 21–25 September 2009; pp. 517–520.