Multilevel classification of security threats in cloud computing

  • Authors

    • N. Srinivasu
    • O. Sree Priyanka
    • M. Prudhvi
    • G. Meghana
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9157
  • Saas, Paas, Iaas, data backup, encryption, DSC, SLA, Virtualization, data transmission.
  • Abstract

    Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.

  • References

    1. [1] King Saud University. Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license.

      [2] Fifth International Conference on Future Generation Communication Tecnlogies(FGCT 2016).

      [3] Luigi Coppolino Salvatore D’Antonio , GiovanniMazzeo , Luigi Romano Cloud security: Emerging threats and current solutions, 2016 Elsevie.

      [4] Ashish Singh, Kakali Chatterjee, Cloud security issues and challenges: a survey, 2016.

      [5] Minhai Ahmad Khan, A survey on security issues on Cloud Computing, 2016.

      [6] International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May-2016 149 ISSN 2229-5518.

      [7] Brian Cusack, Evaluating single sign on security failure in cloud services, 2015.

      [8] (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 3, 2015.

      [9] ICCMIT- M. El-Kafrawya, Azza A. Abdoa, Amr. F. Shawish, Security Issues Over Some Cloud Models,2015.

      [10] Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013.

      [11] Farzad Sabahi, Cloud Computing Security Threats and Responses,2011.

      [12] IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) Vol. 1, No. 2, December 2011.

      [13] D. Fox, “Open web application security project,â€Datenschutz und Datensicherheit-DuD, vol. 30, no. 10, pp. 636–636, 2006.

      [14] R. Charanya et al./International Journal of Engineering and Technology (IJET).

      [15] Yong Yu, Cloud computing security and privacy : Standards and regulations,2016.

      [16] Dr. Seetaiah Kilaru, Hari Kishore K, Sravani T, Anvesh Chowdary L, Balaji T “Review and Analysis of Promising Technologies with Respect to fifth Generation Networksâ€, 2014 First International Conference on Networks & Soft Computing, ISSN:978-1-4799-3486-7/14,pp.270-273,August2014.

      [17] Meka Bharadwaj, Hari Kishore "Enhanced Launch-Off-Capture Testing Using BIST Designs†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.12, Issue No.3, page: 636-643, April 2017.

      [18] N Bala Dastagiri, Kakarla Hari Kishore "Reduction of Kickback Noise in Latched Comparators for Cardiac IMDs†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.43, Page: 1-6, November 2016.

      [19] A Murali, K Hari Kishore, D Venkat Reddy "Integrating FPGAs with Trigger Circuitry Core System Insertions for Observability in Debugging Process†Journal of Engineering and Applied Sciences, ISSN No: 1816-949X, Vol No.11, Issue No.12, page: 2643-2650, December 2016.

      [20] Mahesh Mudavath, K Hari Kishore "Design of CMOS RF Front-End of Low Noise Amplifier for LTE System Applications Integrating FPGAs†Asian Journal of Information Technology, ISSN No: 1682-3915, Vol No.15, Issue No.20, page: 4040-4047, December 2016.

      [21] P Bala Gopal, K Hari Kishore, B.Praveen Kittu “An FPGA Implementation of On Chip UART Testing with BIST Techniquesâ€, International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 14 , pp. 34047-34051, August 2015

      [22] S Nazeer Hussain, K Hari Kishore "Computational Optimization of Placement and Routing using Genetic Algorithm†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.47, page: 1-4, December 2016.

      [23] N Bala Gopal, K Hari Kishore "Analysis of Low Power Low Kickback Noise in Dynamic Comparators in Pacemakers†Indian Journal of Science and Technology, ISSN No: 0974-6846, Vol No.9, Issue No.44, page: 1-4, November 2016.

  • Downloads

  • How to Cite

    Srinivasu, N., Sree Priyanka, O., Prudhvi, M., & Meghana, G. (2017). Multilevel classification of security threats in cloud computing. International Journal of Engineering & Technology, 7(1.5), 253-257. https://doi.org/10.14419/ijet.v7i1.5.9157

    Received date: 2018-01-11

    Accepted date: 2018-01-11

    Published date: 2017-12-31