|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Tuesday 22 May 2018

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

Connect with IJISR

  Call for Papers (May 2018)  
 
 
 

Analysis of Cloud Computing Vulnerabilities


Volume 2, Issue 2, June 2014, Pages 308–312

 Analysis of Cloud Computing Vulnerabilities

Masudur Rahman and Wah Man Cheung

Original language: English

Received 1 May 2014

Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


Cloud computing is one of the most emerging networking technology, which has been considered as significantly effective among different types of users. Using cloud computing can be cost effective and organisation can focus more on their unique business idea instead of IT infrastructure or developing software, if they use IaaS or SaaS according to the business needs. However, there are issues with security of critical business data that is stored on cloud service provider's server. There are many concerns in regards to cloud computing security, which have many vulnerabilities and threats. In our previous paper, we have investigated security issues for cloud computing environment, where we have revealed the lack of awareness of cloud service providers to ensure the security. In this paper we have discussed about more threats and vulnerabilities of cloud computing, which cover some of the technical aspects of this burning issue. We would like to propose a cost effective and efficient security model for cloud computing environment after identifying the security risks involved in this sector of modern computing.

Author Keywords: Cloud computing security, vulnerability of SaaS and PaaS, DoS and DDoS attack, authentication attack, cloud malware injection, metadata-spoofing attack.


How to Cite this Article


Masudur Rahman and Wah Man Cheung, “Analysis of Cloud Computing Vulnerabilities,” International Journal of Innovation and Scientific Research, vol. 2, no. 2, pp. 308–312, June 2014.