CLOUDE PROTECTION INTIMIDATION ANALYSIS
Abstract
Cloud computing is current buzzword in the market. The popularity of clouds has driven privacy laws and data residency restrictions around the world. Cloud computing promises to serve enterprise-computing needs while providing cost savings, particularly in the area of capital H/W, data centers managements and software development. Confidentiality, integrity, availability, authenticity and privacy are essential concerns for both cloud providers and consumers. This paper identifies threats and attacks related to the IaaS layer (Infrastructure as a service) and types of attacks and elaborated study of IaaS components security.
References
Tripathi, A., and Mishra, A. (2011). Cloud Computing Security Considerations”, Signal Processing, Communications and Computing (ICSPCC), IEEE International Conference.
(2011). Understanding the Cloud Computing Stack SaaS, Paas, IaaS, © Diversity Limited.
Kumar, K. G., and Chaudhari, Minubahi. (2012). To Achieve Trust in the Cloud. In 2nd International Conference on Advanced Computing & Communication Technologies.
Purushothama. B., & Amberker, B. (2013). Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation.
Articles published in IJTGBP will be Open-Access articles distributed under the terms and conditions of the Creative Commons Attribution License (CC BY). The copyright is retained by the author(s). GFER Publishing will insert the following note at the bottom of the first page of the published text alongwith its logo:
Published by Licensee GFER Publishers. Copyright: © the author(s). This article is an open access article distributed under the terms andconditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).