VULNERABILITY, THREATS AND ITS COUNTERMEASURE IN CLOUD COMPUTING
@inproceedings{Prashanth2015VULNERABILITYTA, title={VULNERABILITY, THREATS AND ITS COUNTERMEASURE IN CLOUD COMPUTING}, author={S. K. Prashanth and N. Sambasiva Rao}, year={2015} }
cloud computing is a resource sharing, low cost and offering services to users over Internet on rented base. Such services attract the organization to increase or decrease the resources as per requirement. However, the cloud computing services are provided by third-party which is difficult to maintain data security and adds risk to it. Cloud computing has pros and cons such as flexibility, availability, scalability and security issues respectively. We discuss here, to find vulnerabilities in…
No Paper Link Available
Figures from this paper
One Citation
An algorithm to find relationships between web vulnerabilities
- Computer ScienceThe Journal of Supercomputing
- 2016
A new method to map web vulnerability classifications is proposed and the result will be the vulnerabilities an automatic scanner has to detect, which could be executed when the existing classifications change or when new classifications are developed.
References
SHOWING 1-10 OF 13 REFERENCES
Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing
- Computer Science2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)
- 2010
This Research Paper has tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm.
Trust Model to Enhance Security and Interoperability of Cloud Environment
- Computer ScienceCloudCom
- 2009
A novel cloud trust model is introduced to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate.
Mobility Can Help: Protect User Identity with Dynamic Credential
- Computer Science2010 Eleventh International Conference on Mobile Data Management
- 2010
Many communication randomness, like the user mobility, were commonly believed harmful for security are converted to helpful elements to generate dynamic credentials, which introduces interesting security properties.
Security in the cloud
- Computer ScienceCommun. ACM
- 2010
Cloud computing offers many advantages, but also involves security risks, so researchers are devising some ingenious solutions to solve these problems.
PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection
- Computer Science2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
- 2008
A secure migration system that provides live migration capability to VMs in VMM-enforced process protection systems, while not degrading the protection level is proposed.
Managing security of virtual machine images in a cloud environment
- Computer ScienceCCSW '09
- 2009
An image management system is proposed that controls access to images, tracks the provenance of images, and provides users and administrators with efficient image filters and scanners that detect and repair security violations.
Homomorphic Encryption Method Applied to Cloud Computing
- Computer Science, Mathematics
- 2014
This paper proposes the application of a method to perform the operation on encrypted data without decrypting and provide the same result as well that the calculations were carried out on raw data and uses proxy re-encryption technique that prevents ciphertext from chosen cipher text attack.
What's inside the Cloud? An architectural map of the Cloud landscape
- Computer Science2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing
- 2009
We propose an integrated Cloud computing stack architecture to serve as a reference point for future mash-ups and comparative studies. We also show how the existing Cloud landscape maps into this…
Side Channels in Cloud Services: Deduplication in Cloud Storage
- Computer ScienceIEEE Security & Privacy
- 2010
As the volume of data increases, so does the demand for online storage services, from simple backup services to cloud storage infrastructures. Although deduplication is most effective when applied…
Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120)
- Computer Science
- 2001
It is demonstrated that no choice is right for all systems, and an approach to codifying and visualizing this trade-o space is presented, exploring the sensitivity of the space to system characteristics, workload, and desired levels of security and availability.