Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering 2017
DOI: 10.15439/2017r41
|View full text |Cite
|
Sign up to set email alerts
|

Four Dimensional Security and Vulnerability Matrix for Cloud (4-SVM)

Abstract: Abstract-Cloud computing is a catchphrase for today's ICT world. The emerging trend of "Everything as a service" has made this rapid growing technology a very admired and highly demanding technology for a must adapted one. With the virtues of 24x7 service availability, multi tenancy, utility, speed, high productivity, agility, scalability of this technology, it has been proved as an emerging trend for the ICT industry as well as the academia. Today the rapid data analytics is changing the way companies try to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…An attacker can also execute a malware attack to alter data, obtain control, or execute malicious code by injecting a malicious service instance or a virtual machine into the cloud [51]. This allows the attacker access to confidential data [52]. In the authentication attack [53], an attacker uses the vulnerabilities present in the cloud services (such as a single-factor authentication process or weak password) to disrupt the cloud services or steal confidential information.…”
Section: Virtual Layermentioning
confidence: 99%
“…An attacker can also execute a malware attack to alter data, obtain control, or execute malicious code by injecting a malicious service instance or a virtual machine into the cloud [51]. This allows the attacker access to confidential data [52]. In the authentication attack [53], an attacker uses the vulnerabilities present in the cloud services (such as a single-factor authentication process or weak password) to disrupt the cloud services or steal confidential information.…”
Section: Virtual Layermentioning
confidence: 99%