Open Access Open Access  Restricted Access Subscription Access

A Review on Cloud Security Challenges and Issues


Affiliations
1 Department of CSE,KL University, Vijayawada – 520001, Andhra Pradesh, India
 

Background/Objectives: Cloud computing offers various services with minimum management effort while provisioning resources via internet. Cloud clients are allowed to store their personal data at data centers, it will minimize storage maintenance in local systems. Methods/Statistical Analysis: Cloud computing environment facing huge issues with hardware and software vulnerabilities in maintenance and resources provisioning process. These vulnerabilities pose huge loss of data, confidentiality, privacy and availability. Findings: In this paper, we studied and concentrated on various attacks in Virtualization environment and the possible attack scenarios in each platform. Application/Improvements: In the final section, we studied and described all types of attacks.

Keywords

Confidentiality, Integrity, Privacy, Provisioning, Virtualization.
User

Abstract Views: 139

PDF Views: 0




  • A Review on Cloud Security Challenges and Issues

Abstract Views: 139  |  PDF Views: 0

Authors

K. Balaji
Department of CSE,KL University, Vijayawada – 520001, Andhra Pradesh, India
P. Sai Kiran
Department of CSE,KL University, Vijayawada – 520001, Andhra Pradesh, India

Abstract


Background/Objectives: Cloud computing offers various services with minimum management effort while provisioning resources via internet. Cloud clients are allowed to store their personal data at data centers, it will minimize storage maintenance in local systems. Methods/Statistical Analysis: Cloud computing environment facing huge issues with hardware and software vulnerabilities in maintenance and resources provisioning process. These vulnerabilities pose huge loss of data, confidentiality, privacy and availability. Findings: In this paper, we studied and concentrated on various attacks in Virtualization environment and the possible attack scenarios in each platform. Application/Improvements: In the final section, we studied and described all types of attacks.

Keywords


Confidentiality, Integrity, Privacy, Provisioning, Virtualization.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i43%2F123734