SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1355
SURVEY ON SECURITY THREATS AND REMEDIES IN CLOUD COMPUTING
Ms. Mahalakshmi K R1, Ms Megha H C2, Ms. Nandini B R3, Mrs. Hamsaveni M4
¹M. Tech CSE, Dept. of Computer Science &Engineering, Vidyavardhaka College of Engineering, Mysuru,
Karnataka, India
4Assistant Professor, Dept. of Computer Science &Engineering, Vidyavardhaka College of Engineering, Mysuru,
Karnataka, India.
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract: Nowadays Cloud computing is an emerging and
evolving technology and has become very necessary for
computing resources and storing. A huge amount of data is
stored inside the cloud by providing high level of fault-
tolerance. Cloud computing not only allows users to store
the data in the data-centers, also allows to compute
resources on-demand. The data inside the cloud can be
accessed through the remote servers. Cloud computing
serves as internet accessible business model for resource
allocation and provides computing infrastructure on a pay-
per-use as utilities. Security is the major challenge in cloud
computing as the data is being transmitted to the servers
via internet. In this paper we have discussed security
threats and risks associated with cloud computing, and
security concerns in cloud.
INDEX TERMS-Cloud Computing, Security,
Threats/risks, and controls in cloud.
INTRODUCTION
Cloud computing is the terminology for communication
which provides services by using Internet to provide all
resources. It might be networks, servers, storage space,
applications and other required services. Any information
in the cloud are stored in the remote data servers and can
be retrieved and managed using cloud services which are
provided by the service providers. Cloud computing is
evolving to be widely used these days, and increasing its
wage. It's a recent technology that has been exposed and
has gained huge importance in the information technology.
This paper discusses about the existing deployment
models and services of cloud. There are three different
deployment models which can be considered, they are
Public cloud- these clouds can be accessed by the public
through Internet and it is not recommendable. Private
cloud- The access to these clouds are forbidden to the
public and only authorized people can have access to these
clouds. Hybrid clouds- It is the combination of both the
public cloud andprivate clouds, and have customized
features. The services provided by clouds are: Software-
as-a-service (SaaS)- it gives application service to the user,
Platform-as-a-Service (PaaS)- It helps the user to install
customized applications without any additional tool or
software. Infrastructure-as-a-Service (IaaS)- It helps the
user to use storage and networks to run applications in
local systems. It also discusses the security/confidentiality
of cloud computing. The security issues of the clouds
needs to be resolved and also clouds will give certain
features like data backups to secure or to retrieve the lost
data. In this paper we have discussedsecurity threats/risks
associated with cloud computing, and security concerns in
cloud.
I. DEPLOYMENT MODELS OF CLOUD
1. PUBLIC CLOUD: Public clouds works on
Internet and is open to all users. The
infrastructure used is shared data center and
contains all the data of every users [2].
Usersdata is stored in the provider’s data center
and managed by the service providers. Since it is
open to all users it is not recommendable even
though it contains some compliancy regulations.
Public clouds provide excellent performance as
they use shared-resources, but they are
vulnerable to various kinds of attacks.
Figure 1: Public Cloud
2. PRIVATE CLOUD: In the private cloud data
centers are owned by the particular
organizations or a company and managed by the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1356
same. It has no access to external users and
gives access to authorized people [2]. Private
clouds provides more flexibility, scalability,
provisioning, automation and monitoring.
Increased redundancy, Use of dedicated, private
hardware, Decreased provisioning time for new
servers.
Figure 2: Private Cloud
3. HYBRID CLOUD: Hybrid cloud is the
combination of multiple clouds i.e., both private
cloud and the public cloud, it provides lower
cost solutions to issues which might raise during
the usage of clouds [2]. It consists of customized
features and flexible for users to sort out their
feature issues. It provides both private and
public environments. Hybrid cloud works well
for finance, healthcare, legal, retail industries.
Figure 3: Hybrid Cloud
II. TYPES OF CLOUD SERVICES
a) Software-as-a-Service (SaaS)
The abbreviation of SaaSis Software as a
Service. This is the very first layer of cloud
and gives the platform for users for installing
applications and to use those applications
from cloud and does not give the burden of
maintenance [3]. It works for the favor of
users with user friendly interfaces.
b) Platform-as-a-Service (PaaS)
The abbreviation of PaaS is Platform as a
service. It provides freedom to use any
applications without downloading any
specific platforms to that application. We can
use or integrate other applications by using
porting. Paas is an effective service to get high
productive rate.
c) Infrastructure-as-a-Service (IaaS)
It is the abbreviation of Infrastructure as a
service. It provides the storage facility to the
user. It makes use of Internet as a business. It
mainly focuses on network, storage space,
web architecture and deals with managing
this architecture [3].
Figure 4. Types of Cloud Services
III. THREATS AND RISKS OF SECURITY
The threats and risks of security areas follows:
1. Backdoor Channel attacks
Backdoor channel attack occurs in IaaS platform.
when effective user’s high permeation is given on
the VM’s or the Hypervisor level. This kind of attacks
may affect the service availability data privacy [4].
2. Cross-site-scripting attacks: These kind of attacks
are the most powerful attacks of security weakness
which commonly found through the web
applications. Java scripting language is the widest
range scripting languagecommonly used in such
attack [4].
3. Denial-of-Service attacks: In these attacks, If the
users intend to request the service from the server
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1357
the service will not be available. It provides the
service is not found by displaying 404 error.
4. Insecure application programming
interface:When the service providers deliver the
service to the customers using APIs this type of
attack appears, the APIs having encryption with
secure authentication, provided with activity
monitoring mechanisms secure access control and
5. Man-in-the-middle attacks: In this attack the
autonomous connection is made between the
customer and the service provider, without their
knowledge they observe the data and the
information for the service.
6. Metadata spoofing attack: In this type of attack,
The service metadata document is sent to the client
system bythe web services providers it contains all
the service invocationinformation, such as the
message format, security requirements, also the
network location. In this case, objective of the
attacker is to reengineer the web service metadata
descriptions.
7. Malicious insiders: This kind of threat happens
when there is alack in security concern for how to
access the service provider by employees to the
virtual properties of the cloud. This threat may be
more complex due to employee’s privilege in lack of
implementing in the cloud system and updated the
responsibilities when their behavior or job is
changed.
8. Phishing attack: This kind of attack affects the user
privacy and the exposure of data and information.
The users are allowed to access fake web link which
is installed in their PCs: that data is exposed by
malicious codes.
9. SQL Injection attacks: This kind of attack occurs
when hackers are trying to attack website database
through the website inquiry methods that can
deactivate website securityby the code injected
inside SQL statements.
10. Shared technology’s vulnerabilities: This kind of
issue is related to cloud computing. It uses the
infrastructures same as that is used in the internet
shared among cloud customers. Hence, all the
problems that are currently in the infrastructure of
the internet will be migrated to the cloud.
IV. IMPROVEMENTS/REMEDY & CONTROLS FOR
CLOUD
The harmed and hazards are associated with cloud are
well documented. Both the one who uses the cloud
services and the one who is provided the cloud
services has to devised the improvements and controls
to understand the risks depends on their evaluation.
Here, some of the following more efficient or
qualitative and quantitative improvement and control
can be considered. They are as follows [5]
1. Extreme part of the encryption
The data belonging to cloud will travels through
many geographical places.
2. Examine for diverse activities
It is a part of encryption or end to end encryption
technique and it is highly preferable. It is plays a
vital role to have proper controls over and
improvement to mitigate risks from destructive
software passing through diverse activities.
3. Authentication of cloud user
The cloud service facilitator has to take some
important precautions to screen the cloud users to
prevent important extracted features of cloud being
used for diverse attacks.
4. Safe link and APIs
The link is just like interface to cloud and APIs are
plays a vital role in implementing robotic, regularity,
and to control. The cloud service provider has to
ensure that any misused happened.
5. Insider attacks
Cloud providers should take care of safeguard
employee and builders, along with build up internal
security systems to prevent the misuse.
6. Secure and advantageous resources
In a shared/multi-tenancy model, the hypervisor,
orchestration, and monitoring tools has provided by
secure and advantageous resources.
7. Business Continuity plans
The process of handling the reporting the response
of the organization to any incidents that may cause
unavailability of whole or part of a business-critical
process is called business continuity plans.
CONCLUSION
As discussed in this paper cloud computing is an evolving
technology and has numerous benefits, Consumers are
able to use these benefits as per their requirement based
on the pay-per-usage facility provided by the cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1358
Security is the major challenge in cloud computing, here in
this paper we have discussed some of the features of cloud,
deployment models and types of the cloud. Also made a
survey of different kinds of threats and risks of security
and the improvements remedies and controls of cloud
REFERENCES
[1]. Kowsalyadevi Prakash, “A Survey On Security And
Privacy In Cloud Computing” in: 2013 International
Journal of Engineering Research & Technology (IJERT),
Vol. 2 Issue 2, February- 2013
[2]. Srijita Basu,Arjun Bardhan, Koyal Gupta,Payel Saha,
Mahasweta Pal,Manjima Bose, Kaushik Basu,Saunak
Chaudhury, Pritika Sarkar, “Cloud Computing Security
Challenges & Solutions-A Survey”, in: January 2018,IEEE
journal.
[3]. Wg Cdr Nimit Kaura, Lt Col Abhishek Lal, “Survey
paper on Cloud Computing Security”, in: 2017 IEEE
international conference on innovations in information,
Embedded and communication systems(ICIECS).
[4].Hussam Alddin S. Ahmed, Mohammed Hasan Ali, Laith
M. Kadhum, Mohamad Fadli Bin Zolkipli, Yazan A.
Alsariera,”A Review of Challenges and Security Risks of
Cloud Computing”,in: 2017, Vol. 9 No. 1-2.
[5].Gururaj Ramachandra,, Mohsin Iftikhar, Farrukh Aslam
Khan, “A Comprehensive Survey on Security in Cloud
Computing” in: 2017 3rd International Workshop on Cyber
Security and Digital Investigation.
[6]. P. Ravi Kumara, P. Herbert Rajb, P. Jelcianac,
“Exploring Data Security Issues and Solutions in Cloud
Computing”, in:2017 6th International Conference on
Smart Computing and Communications, ICSCC 2017, 7-8
December 2017, Kurukshetra, India.
[7].Sabiyyah Sabir, “Security Issues in Cloud Computing
and their Solutions: A Review”, in: 2018 (IJACSA)
International Journal of Advanced Computer Science and
Applications, Vol. 9, No. 11.
[8]. Abdulaziz Alshammari*, Suaiman Alhaidari*, Ali
Alharbi*, Mohamed Zohdy, “Security Threats and
Challenges in Cloud Computing”, in: 2017 IEEE 4th
International conference on Cyber Security and Cloud
Computing.
[9]. Andrey N. Rukavitsyn, Konstantin A. Borisenko,Ivan I.
Holod, Andrey V. Shorov, “The Method of Ensuring
Confidentiality and Integrity Data in Cloud Computing”,
2017 IEEE.
[10]. Ravichandiran C, “Data Security Challenges ans its
Solutions for cloud computing”, IRACST, IJACEA,
ISSN:2319-281X, Vol. 3, No.6, in: December 2014.
[11].Gurjeet Singh, Dr. Mohita Garg, “Data Security In
Cloud Computing: A Review”, in: 2018 International
Journal Of Computers & Technology,Volume: 17 Issue: 02.

More Related Content

What's hot

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
eSAT Publishing House
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
islamic republic of iran Railway
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
bornresearcher
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
Cohesive Networks
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
Karla Sasser, CPA CITP, CIA, CGMA
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET Journal
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
Wilmer Gomez Reyes
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
IJRAT
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ahmad abdelhafeez
 

What's hot (19)

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...A dynamic policy based security-as-a-service infrastructure for cloud environ...
A dynamic policy based security-as-a-service infrastructure for cloud environ...
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 

Similar to IRJET- Survey on Security Threats and Remedies in Cloud Computing

IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET Journal
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET Journal
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
eSAT Publishing House
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
IRJET Journal
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
cloudresearcher
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Mervat Bamiah
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET Journal
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading ApplicationsIRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET Journal
 

Similar to IRJET- Survey on Security Threats and Remedies in Cloud Computing (20)

IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and ChallengesIRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both Entities
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
IRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading ApplicationsIRJET- Detecting Performance of Clouds by Uploading Applications
IRJET- Detecting Performance of Clouds by Uploading Applications
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 

Recently uploaded (20)

2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 

IRJET- Survey on Security Threats and Remedies in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1355 SURVEY ON SECURITY THREATS AND REMEDIES IN CLOUD COMPUTING Ms. Mahalakshmi K R1, Ms Megha H C2, Ms. Nandini B R3, Mrs. Hamsaveni M4 ¹M. Tech CSE, Dept. of Computer Science &Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India 4Assistant Professor, Dept. of Computer Science &Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India. ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract: Nowadays Cloud computing is an emerging and evolving technology and has become very necessary for computing resources and storing. A huge amount of data is stored inside the cloud by providing high level of fault- tolerance. Cloud computing not only allows users to store the data in the data-centers, also allows to compute resources on-demand. The data inside the cloud can be accessed through the remote servers. Cloud computing serves as internet accessible business model for resource allocation and provides computing infrastructure on a pay- per-use as utilities. Security is the major challenge in cloud computing as the data is being transmitted to the servers via internet. In this paper we have discussed security threats and risks associated with cloud computing, and security concerns in cloud. INDEX TERMS-Cloud Computing, Security, Threats/risks, and controls in cloud. INTRODUCTION Cloud computing is the terminology for communication which provides services by using Internet to provide all resources. It might be networks, servers, storage space, applications and other required services. Any information in the cloud are stored in the remote data servers and can be retrieved and managed using cloud services which are provided by the service providers. Cloud computing is evolving to be widely used these days, and increasing its wage. It's a recent technology that has been exposed and has gained huge importance in the information technology. This paper discusses about the existing deployment models and services of cloud. There are three different deployment models which can be considered, they are Public cloud- these clouds can be accessed by the public through Internet and it is not recommendable. Private cloud- The access to these clouds are forbidden to the public and only authorized people can have access to these clouds. Hybrid clouds- It is the combination of both the public cloud andprivate clouds, and have customized features. The services provided by clouds are: Software- as-a-service (SaaS)- it gives application service to the user, Platform-as-a-Service (PaaS)- It helps the user to install customized applications without any additional tool or software. Infrastructure-as-a-Service (IaaS)- It helps the user to use storage and networks to run applications in local systems. It also discusses the security/confidentiality of cloud computing. The security issues of the clouds needs to be resolved and also clouds will give certain features like data backups to secure or to retrieve the lost data. In this paper we have discussedsecurity threats/risks associated with cloud computing, and security concerns in cloud. I. DEPLOYMENT MODELS OF CLOUD 1. PUBLIC CLOUD: Public clouds works on Internet and is open to all users. The infrastructure used is shared data center and contains all the data of every users [2]. Usersdata is stored in the provider’s data center and managed by the service providers. Since it is open to all users it is not recommendable even though it contains some compliancy regulations. Public clouds provide excellent performance as they use shared-resources, but they are vulnerable to various kinds of attacks. Figure 1: Public Cloud 2. PRIVATE CLOUD: In the private cloud data centers are owned by the particular organizations or a company and managed by the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1356 same. It has no access to external users and gives access to authorized people [2]. Private clouds provides more flexibility, scalability, provisioning, automation and monitoring. Increased redundancy, Use of dedicated, private hardware, Decreased provisioning time for new servers. Figure 2: Private Cloud 3. HYBRID CLOUD: Hybrid cloud is the combination of multiple clouds i.e., both private cloud and the public cloud, it provides lower cost solutions to issues which might raise during the usage of clouds [2]. It consists of customized features and flexible for users to sort out their feature issues. It provides both private and public environments. Hybrid cloud works well for finance, healthcare, legal, retail industries. Figure 3: Hybrid Cloud II. TYPES OF CLOUD SERVICES a) Software-as-a-Service (SaaS) The abbreviation of SaaSis Software as a Service. This is the very first layer of cloud and gives the platform for users for installing applications and to use those applications from cloud and does not give the burden of maintenance [3]. It works for the favor of users with user friendly interfaces. b) Platform-as-a-Service (PaaS) The abbreviation of PaaS is Platform as a service. It provides freedom to use any applications without downloading any specific platforms to that application. We can use or integrate other applications by using porting. Paas is an effective service to get high productive rate. c) Infrastructure-as-a-Service (IaaS) It is the abbreviation of Infrastructure as a service. It provides the storage facility to the user. It makes use of Internet as a business. It mainly focuses on network, storage space, web architecture and deals with managing this architecture [3]. Figure 4. Types of Cloud Services III. THREATS AND RISKS OF SECURITY The threats and risks of security areas follows: 1. Backdoor Channel attacks Backdoor channel attack occurs in IaaS platform. when effective user’s high permeation is given on the VM’s or the Hypervisor level. This kind of attacks may affect the service availability data privacy [4]. 2. Cross-site-scripting attacks: These kind of attacks are the most powerful attacks of security weakness which commonly found through the web applications. Java scripting language is the widest range scripting languagecommonly used in such attack [4]. 3. Denial-of-Service attacks: In these attacks, If the users intend to request the service from the server
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1357 the service will not be available. It provides the service is not found by displaying 404 error. 4. Insecure application programming interface:When the service providers deliver the service to the customers using APIs this type of attack appears, the APIs having encryption with secure authentication, provided with activity monitoring mechanisms secure access control and 5. Man-in-the-middle attacks: In this attack the autonomous connection is made between the customer and the service provider, without their knowledge they observe the data and the information for the service. 6. Metadata spoofing attack: In this type of attack, The service metadata document is sent to the client system bythe web services providers it contains all the service invocationinformation, such as the message format, security requirements, also the network location. In this case, objective of the attacker is to reengineer the web service metadata descriptions. 7. Malicious insiders: This kind of threat happens when there is alack in security concern for how to access the service provider by employees to the virtual properties of the cloud. This threat may be more complex due to employee’s privilege in lack of implementing in the cloud system and updated the responsibilities when their behavior or job is changed. 8. Phishing attack: This kind of attack affects the user privacy and the exposure of data and information. The users are allowed to access fake web link which is installed in their PCs: that data is exposed by malicious codes. 9. SQL Injection attacks: This kind of attack occurs when hackers are trying to attack website database through the website inquiry methods that can deactivate website securityby the code injected inside SQL statements. 10. Shared technology’s vulnerabilities: This kind of issue is related to cloud computing. It uses the infrastructures same as that is used in the internet shared among cloud customers. Hence, all the problems that are currently in the infrastructure of the internet will be migrated to the cloud. IV. IMPROVEMENTS/REMEDY & CONTROLS FOR CLOUD The harmed and hazards are associated with cloud are well documented. Both the one who uses the cloud services and the one who is provided the cloud services has to devised the improvements and controls to understand the risks depends on their evaluation. Here, some of the following more efficient or qualitative and quantitative improvement and control can be considered. They are as follows [5] 1. Extreme part of the encryption The data belonging to cloud will travels through many geographical places. 2. Examine for diverse activities It is a part of encryption or end to end encryption technique and it is highly preferable. It is plays a vital role to have proper controls over and improvement to mitigate risks from destructive software passing through diverse activities. 3. Authentication of cloud user The cloud service facilitator has to take some important precautions to screen the cloud users to prevent important extracted features of cloud being used for diverse attacks. 4. Safe link and APIs The link is just like interface to cloud and APIs are plays a vital role in implementing robotic, regularity, and to control. The cloud service provider has to ensure that any misused happened. 5. Insider attacks Cloud providers should take care of safeguard employee and builders, along with build up internal security systems to prevent the misuse. 6. Secure and advantageous resources In a shared/multi-tenancy model, the hypervisor, orchestration, and monitoring tools has provided by secure and advantageous resources. 7. Business Continuity plans The process of handling the reporting the response of the organization to any incidents that may cause unavailability of whole or part of a business-critical process is called business continuity plans. CONCLUSION As discussed in this paper cloud computing is an evolving technology and has numerous benefits, Consumers are able to use these benefits as per their requirement based on the pay-per-usage facility provided by the cloud.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1358 Security is the major challenge in cloud computing, here in this paper we have discussed some of the features of cloud, deployment models and types of the cloud. Also made a survey of different kinds of threats and risks of security and the improvements remedies and controls of cloud REFERENCES [1]. Kowsalyadevi Prakash, “A Survey On Security And Privacy In Cloud Computing” in: 2013 International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 2, February- 2013 [2]. Srijita Basu,Arjun Bardhan, Koyal Gupta,Payel Saha, Mahasweta Pal,Manjima Bose, Kaushik Basu,Saunak Chaudhury, Pritika Sarkar, “Cloud Computing Security Challenges & Solutions-A Survey”, in: January 2018,IEEE journal. [3]. Wg Cdr Nimit Kaura, Lt Col Abhishek Lal, “Survey paper on Cloud Computing Security”, in: 2017 IEEE international conference on innovations in information, Embedded and communication systems(ICIECS). [4].Hussam Alddin S. Ahmed, Mohammed Hasan Ali, Laith M. Kadhum, Mohamad Fadli Bin Zolkipli, Yazan A. Alsariera,”A Review of Challenges and Security Risks of Cloud Computing”,in: 2017, Vol. 9 No. 1-2. [5].Gururaj Ramachandra,, Mohsin Iftikhar, Farrukh Aslam Khan, “A Comprehensive Survey on Security in Cloud Computing” in: 2017 3rd International Workshop on Cyber Security and Digital Investigation. [6]. P. Ravi Kumara, P. Herbert Rajb, P. Jelcianac, “Exploring Data Security Issues and Solutions in Cloud Computing”, in:2017 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7-8 December 2017, Kurukshetra, India. [7].Sabiyyah Sabir, “Security Issues in Cloud Computing and their Solutions: A Review”, in: 2018 (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 11. [8]. Abdulaziz Alshammari*, Suaiman Alhaidari*, Ali Alharbi*, Mohamed Zohdy, “Security Threats and Challenges in Cloud Computing”, in: 2017 IEEE 4th International conference on Cyber Security and Cloud Computing. [9]. Andrey N. Rukavitsyn, Konstantin A. Borisenko,Ivan I. Holod, Andrey V. Shorov, “The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing”, 2017 IEEE. [10]. Ravichandiran C, “Data Security Challenges ans its Solutions for cloud computing”, IRACST, IJACEA, ISSN:2319-281X, Vol. 3, No.6, in: December 2014. [11].Gurjeet Singh, Dr. Mohita Garg, “Data Security In Cloud Computing: A Review”, in: 2018 International Journal Of Computers & Technology,Volume: 17 Issue: 02.