Big Data, Cloud Computing and IoT 2023
DOI: 10.1201/9781003298335-2
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Environment Limitations and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
4
0
1
Order By: Relevance
“…In this attack, real time operations of information exchange, transactional operations and communication are interfered with [36]. Different types of attacks in this case are spoofing of IP and hijacking of sessions on the network [37], [38], [39]. Systems to detect intrusions may be implemented to prevent this level of attack as they give alerts when intrusions are executed.…”
Section: Man-in-the-middle (Mitm) Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In this attack, real time operations of information exchange, transactional operations and communication are interfered with [36]. Different types of attacks in this case are spoofing of IP and hijacking of sessions on the network [37], [38], [39]. Systems to detect intrusions may be implemented to prevent this level of attack as they give alerts when intrusions are executed.…”
Section: Man-in-the-middle (Mitm) Attacksmentioning
confidence: 99%
“…[25] - [30] Man in the Middle (MitM) [31] - [34] Drive by Download [35] - [38] Password attacks [39] - [42] SQL Injection [5], [43] - [44] Cross Site Scripting (XSS)…”
Section: Author (S) Identified Attack (S)mentioning
confidence: 99%
“…Platform as a service which enables virtual development environment to the users so that users can develop cloud applications on top of cloud environment. Software as a service gives readymade application services to be given to users developed by cloud vendors [2] and all these services to be deployed using various models known as public, private, hybrid, community cloud deployment models [3]. All these services are given to users based on customer need and they are customized by specifying Service level agreements (SLA).…”
Section: Introductionmentioning
confidence: 99%
“…An efficient and dynamic task scheduler is needed to manage these types of requests and distribute resources to various cloud users when users request services from the cloud environment at the same time and these requirements are made by customers from various heterogeneous, diversified resources. [2]. By offering extra resources like additional memory, storage, or processors, virtualization in cloud computing also enables us to set up access control over the resources to safeguard them and enable optimal resource usage.…”
Section: Introductionmentioning
confidence: 99%