Corpus ID: 212511887

VULNERABILITY, THREATS AND ITS COUNTERMEASURE IN CLOUD COMPUTING

@inproceedings{Prashanth2015VULNERABILITYTA,
  title={VULNERABILITY, THREATS AND ITS COUNTERMEASURE IN CLOUD COMPUTING},
  author={S. Prashanth and N. Rao},
  year={2015}
}
cloud computing is a resource sharing, low cost and offering services to users over Internet on rented base. Such services attract the organization to increase or decrease the resources as per requirement. However, the cloud computing services are provided by third-party which is difficult to maintain data security and adds risk to it. Cloud computing has pros and cons such as flexibility, availability, scalability and security issues respectively. We discuss here, to find vulnerabilities in… Expand
1 Citations

Figures from this paper

An algorithm to find relationships between web vulnerabilities
TLDR
A new method to map web vulnerability classifications is proposed and the result will be the vulnerabilities an automatic scanner has to detect, which could be executed when the existing classifications change or when new classifications are developed. Expand

References

SHOWING 1-10 OF 13 REFERENCES
Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing
TLDR
This Research Paper has tried to assess Cloud Storage Methodology and Data Security in cloud by the Implementation of digital signature with RSA algorithm. Expand
Trust Model to Enhance Security and Interoperability of Cloud Environment
TLDR
A novel cloud trust model is introduced to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. Expand
Mobility Can Help: Protect User Identity with Dynamic Credential
  • Sheng Xiao, W. Gong
  • Computer Science
  • 2010 Eleventh International Conference on Mobile Data Management
  • 2010
TLDR
Many communication randomness, like the user mobility, were commonly believed harmful for security are converted to helpful elements to generate dynamic credentials, which introduces interesting security properties. Expand
Security in the cloud
TLDR
Cloud computing offers many advantages, but also involves security risks, so researchers are devising some ingenious solutions to solve these problems. Expand
Side Channels in Cloud Services: Deduplication in Cloud Storage
As the volume of data increases, so does the demand for online storage services, from simple backup services to cloud storage infrastructures. Although deduplication is most effective when appliedExpand
PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection
TLDR
A secure migration system that provides live migration capability to VMs in VMM-enforced process protection systems, while not degrading the protection level is proposed. Expand
Managing security of virtual machine images in a cloud environment
TLDR
An image management system is proposed that controls access to images, tracks the provenance of images, and provides users and administrators with efficient image filters and scanners that detect and repair security violations. Expand
Homomorphic Encryption Method Applied to Cloud Computing
“Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on ciphertext and obtain an encrpted result which when decrypted matches the result ofExpand
What's inside the Cloud? An architectural map of the Cloud landscape
We propose an integrated Cloud computing stack architecture to serve as a reference point for future mash-ups and comparative studies. We also show how the existing Cloud landscape maps into thisExpand
Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120)
TLDR
It is demonstrated that no choice is right for all systems, and an approach to codifying and visualizing this trade-o space is presented, exploring the sensitivity of the space to system characteristics, workload, and desired levels of security and availability. Expand
...
1
2
...