Assessment of Security Issues in Cloud Computing
Zahra Jabeen1, Mohd. Suaib2
1Zahra Jabeen, Integral University, Kursi Road, Lucknow (U.P), India.
2Mohd. Suaib, Integral University, Kursi Road, Lucknow (U.P), India.
Manuscript received on 16 August 2019 | Revised Manuscript received on 28 August 2019 | Manuscript Published on 06 September 2019 | PP: 437-439 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F10930886S19/19©BEIESP | DOI: 10.35940/ijeat.F1093.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A computing model in which the computing resources such as hardware, software and data are provided as a service via web browser or light-weight desktop machine on the internet is termed as Cloud computing. This computing model demolishes the requirement of keeping the resources of computer locally hence reducing the cost of worthy resources (Llorente, Montero & Moreno, 2012). A typical cloud is affected by various security concerns such as Temporary Denial of Service (TDOS) attacks, hijacking session issues, flashing attacks and theft of user identity. The motto of this study is to overcome the research gap between the cloud security constraints and the existing security danger. An investigation into the present cloud service models, presently applied security measures, security standards and their level of flawless shielding has been done. This thematic study helped in disclosing various security issues and their counter measures whereas the empirical study facilitated in acknowledgement of the botherings of users and security analysts in regards to those solution strategy. The empirical methods used in this research were interviews and questionnaires to justify the theoretical findings and to gain the originality of practitioners dealing with cloud security.
Keywords: Computing, Security, Cloud Data Breaching, Theft of User’s Identity, Hijacking Session, Flashing Attacks.
Scope of the Article: Cloud Computing