2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905258
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing: Technology, security issues and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…A study by Trigueros-Preciado et. al., (2013) found cloud computing security to be of a supreme concern to subscribers and this discovery in 2017 remains unchanged as confirmed by Ahmed (2017) study. The Treacherous 12 (2017) survey identifies data security breaches such as: The two Yahoo!…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…A study by Trigueros-Preciado et. al., (2013) found cloud computing security to be of a supreme concern to subscribers and this discovery in 2017 remains unchanged as confirmed by Ahmed (2017) study. The Treacherous 12 (2017) survey identifies data security breaches such as: The two Yahoo!…”
Section: Introductionmentioning
confidence: 92%
“…Malicious attackers have found ways of going round them to compromised vital business data asset using network security attacks as Dos/DDoS, U2R attack, R2U attack, Probing attack, MITM attack, Message replay attack, and Brute-Force analysis attack (Khandelwal, 2017). According to Wang (2009), cloud computing technology distributes data on multiple servers belonging to a single CSP but the challenge as noted by Ahmed (2017) is implementing a distributed protocol architecture that assures of a robust secured cloud data security in a defense-in-depth design.…”
Section: Introductionmentioning
confidence: 99%
“…The MAS (multi-agent systems) not only improve the performance and quality of service but also helps in making decisions when interacting with the external environment. Prachi Garg ,Dr.Sandeep Goel,Dr.Avinash Sharma [3], "Security Techniques for Cloud Computing Environment", describes the problem of data security has been investigated it also highlights the existing security attacks on the basis of Amazon EC2 cloud. The attacks on web applications such as SQL injection attacks, Man-in-middle attack, Cross site scripting attacks, the security attacks at network level such as DNS attack, Sniffer attack and at application level such as Denial of service attacks, Cookie poising, Backdoor attacks etc has been discussed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cloud computing offers a robust ecosystem of software services, vendors and ICT resources. Initially, cloud services were offered in three basic modes, i.e., software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) [8]. Later domain-specific services also started, such as business process as a service (BPaaS) [9].…”
Section: Introductionmentioning
confidence: 99%