scispace - formally typeset
Open AccessJournal Article

A Survey on Security Threats for Cloud Computing

Nagaraju Kilari, +1 more
- 25 Sep 2012 - 
- Vol. 1, Iss: 7
Reads0
Chats0
TLDR
An attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.
Abstract
Cloud Computing provides an efficient and flexible way for services to meet escalating business needs. Cloudshared infrastructure and associated services make it cost effective alternative to traditional approaches. However, they may also introduce security breaches and privacy issues. As more cloud based applications keep evolving, the associated security threats are also growing. Many research works on cloud security exist in partial forms of either specifically on cloud issues or virtualization-related security issues. In this paper, an attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics

TL;DR: This review provides useful information and insights to researchers and practitioners who are interested in cybersecurity of IoT, including the current research of IoT cybersecurity, IoT cybersecurity architecture and taxonomy, key enabling countermeasures and strategies, major applications in industries, research trends and challenges.
Journal ArticleDOI

A Review of Machine Learning Algorithms for Cloud Computing Security

TL;DR: This review paper presents an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms used to overcome the cloud security issues including supervised, unsupervised, semi- supervised, and reinforcement learning.
Proceedings ArticleDOI

IoT security: A layered approach for attacks & defenses

TL;DR: The security challenges in the four layers of the IoT architecture and their solutions proposed from 2010 to 2016 are evaluated and important security technologies like encryption are analyzed in the IoT context.
Journal ArticleDOI

Security features embedded in computer aided design (CAD) solid models for additive manufacturing

TL;DR: The present work aims at developing design features in CAD models that can be used for the purpose of security against counterfeiting and represents design methodologies that need to be developed for the given component design and the desired AM technique.
Journal ArticleDOI

A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method

TL;DR: This research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization (EGA-PSO) and improved random forest (IRF) methods to deal with the data imbalance issue.
References
More filters
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI

Controlling data in the cloud: outsourcing computation without outsourcing control

TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Journal ArticleDOI

Cloud computing security issues and challenges

TL;DR: Security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering are discussed and recommended security standards and management models to address these are suggested for technical and business community.
Proceedings ArticleDOI

HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity

TL;DR: This paper presents HyperSafe, a lightweight approach that endows existing Type-I bare-metal hypervisors with a unique self-protection capability to provide lifetime control flow integrity and shows HyperSafe can reliably enable the hypervisor self- protection and provide the integrity guarantee with a small performance overhead.
Proceedings ArticleDOI

The management of security in Cloud computing

TL;DR: Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.
Related Papers (5)