2017
DOI: 10.1016/j.aci.2016.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel classification of security concerns in cloud computing

Abstract: Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 80 publications
(20 citation statements)
references
References 3 publications
0
19
0
1
Order By: Relevance
“…In the same manner, it is also vital cloud subscribers knows the security measures employed by their chosen CSP in combating the Confidentiality Intergrity Availability (CIA) security traits (Shah and Anandane, 2013). As the cloud subscriber/tenant usually have no physical control over cloud infrastructure in most cloud setup, contract agreements, service level agreements (SLA's) and providers documentation become vital in managing risks than in a traditional enterprise owned hosting environment (Hussain et. al., 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the same manner, it is also vital cloud subscribers knows the security measures employed by their chosen CSP in combating the Confidentiality Intergrity Availability (CIA) security traits (Shah and Anandane, 2013). As the cloud subscriber/tenant usually have no physical control over cloud infrastructure in most cloud setup, contract agreements, service level agreements (SLA's) and providers documentation become vital in managing risks than in a traditional enterprise owned hosting environment (Hussain et. al., 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Two policies of enforcement method providing reliable data by encompassing the chain of trust to map-reduce application. Similarly, security disputes in Software-as-a-Service (SaaS) layer are classified as two as attack on development tool and attack on the management tool [10]. Security attacks are on the development tool, on the Application Programming Interface (API) and attack on the publisher.…”
Section: Related Workmentioning
confidence: 99%
“…We believe that a combination of these approaches makes it possible to redirect target VM network traffic at run-time. Even encrypted network traffic, if successfully intercepted, may be readily decrypted [20] using third-party tools such as aircrack [10]. The decrypted traffic of the target VM can be used for further analysis to predict its activity, and compromise privacy.…”
Section: B Proposed Attack Vectormentioning
confidence: 99%