|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Friday 22 November 2024

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJISR

   
 
 
 

Analysis of Cloud Computing Vulnerabilities


Volume 2, Issue 2, June 2014, Pages 308–312

 Analysis of Cloud Computing Vulnerabilities

Masudur Rahman1 and Wah Man Cheung2

1 Faculty of Business and Services, Colchester Institute, United Kingdom
2 School of Computer Science and Electronic Engineering, University of Essex, United Kingdom

Original language: English

Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


Cloud computing is one of the most emerging networking technology, which has been considered as significantly effective among different types of users. Using cloud computing can be cost effective and organisation can focus more on their unique business idea instead of IT infrastructure or developing software, if they use IaaS or SaaS according to the business needs. However, there are issues with security of critical business data that is stored on cloud service provider's server. There are many concerns in regards to cloud computing security, which have many vulnerabilities and threats. In our previous paper, we have investigated security issues for cloud computing environment, where we have revealed the lack of awareness of cloud service providers to ensure the security. In this paper we have discussed about more threats and vulnerabilities of cloud computing, which cover some of the technical aspects of this burning issue. We would like to propose a cost effective and efficient security model for cloud computing environment after identifying the security risks involved in this sector of modern computing.

Author Keywords: Cloud computing security, vulnerability of SaaS and PaaS, DoS and DDoS attack, authentication attack, cloud malware injection, metadata-spoofing attack.


How to Cite this Article


Masudur Rahman and Wah Man Cheung, “Analysis of Cloud Computing Vulnerabilities,” International Journal of Innovation and Scientific Research, vol. 2, no. 2, pp. 308–312, June 2014.