International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 139    Submit Your Rating     Cite This   Download        Certificate

CLOUD COMPUTING-“HIDDEN VULNERABILITIES”

    2 Author(s):  SUMIT KUMAR BABERWAL , NIDHI PASSI

Vol -  5, Issue- 7 ,         Page(s) : 147 - 153  (2014 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Cloud computing has taken a centre stage in the time of business development. Working from different places accessing same shared resources and reverting back at a common store has never been so easy. It has benefitted not only in resource utilization but has also helped in the globalization to a larger extent. In the era of compaction, it’s not less than a magic wand to use the desired wishes anytime, anywhere! But along with that it has also poised some serious threats which could spread through one network and may harm many interrelated resources and challenge security measures. This paper provides an analysis of cloud computing, cloud data storage security, the security risks involved and software security pertaining to the cloud. The paper also indicates about the measures that could add into the trust factor regarding cloud computing. It mentions about how some of the important security services provides authentication and authorization. Security measures along with these features are supposed to provide data integrity and confidentiality under technological and process related aspects.

  1. Kaufman, L. M., 2009, “Data Security in the World of Cloud Computing”, Security & Privacy, 7(4):61–64.
  2. Kandukuri, B. R., V. R. Paturi, and A. Rakshit,   2009, “Cloud Security Issues”, In Proceedings of the IEEE International Conference on Services Computing,pp. 517–520.
  3. Sabahi, F. 2011. Virtualization-level security in cloud computing. Proceedings of IEEE International Conference on Communication Software and Networks. Page no. 250-254. DOI: 10.1109/ICCSN.2011.6014716.
  4. Wang, C., Q. Wang, K. Ren, and W. Lou, 2010, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, In Proceedings of the IEEE INFOCOM, pp. 1–9.
  5. Begum, S. and M. K. Khan, 2011, “Potential of Cloud Computing Architecture”, In proceedings of  the International Conference on Information and Communication Technologies, pp. 1–5.
  6. G. Klein et al., “seL4: Formal Verification of an OS Kernel,” Proc. ACM SIGOPS 22nd Symp. Operating Systems Principles (SOSP 09), ACM Press, 2009, pp. 207–220.
  7. Amazon White Paper   ,http://aws.amazon.com/about-aws/whats-new/2009/06/08/new-aws-security-center-and-security-whitepaper/,published June 2009.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details