IJERT-EMS
IJERT-EMS

A Review on Security Threats and Vulnerabilities in Cloud Computing


A Review on Security Threats and Vulnerabilities in Cloud Computing
Authors : Elavarasan. G, Dr. Veni. S
Publication Date: 02-07-2015

Authors

Author(s):  Elavarasan. G, Dr. Veni. S

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Volume. 4 - Issue. 07 , July - 2015

e-ISSN:   2278-0181

 DOI:  http://dx.doi.org/10.17577/IJERTV4IS070073

Abstract

Cloud computing is a way to increase the capacity or add abilities dynamically without advancing in brand new infrastructure, training fresh workers, or allowing new software. It spreads information technology’s (IT) existing abilities. In the last few years, cloud computing has grown from being a talented business concept to one of the fast-growing sectors of the IT sectors. Despite all the hype surrounding the cloud, initiative regulars are still unwilling to deploy their business in the cloud. Security is one of the foremost issues that reduced the growth of cloud computing and problems with data privacy, and data security remained to an outbreak the market. A new model aiming at improving features of a surviving model must not risk or threaten and vulnerability's other important features of the current model. In this paper, a review of the dissimilar security risks that pose a threat to the cloud is made in.

Citations

Number of Citations for this article:  Data not Available

Keywords

Key Word(s):    

Downloads

Number of Downloads:     282

Call for Papers - May - 2017

        

 

                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book