Study of Vulnerabilities in cloud computing |
Author(s): |
Dnyaneshwar Bhabad , , Shree L.R. Tiwari College of Engineering, Mira rd.; Dnyaneshwar Bhabad, , Shree L.R. Tiwari College of Engineering, Mira rd.; Pratik Sankhe, , Shree L.R. Tiwari College of Engineering, Mira rd.; Vinayak Shinde, , Shree L.R. Tiwari College of Engineering, Mira rd. |
Keywords: |
Cloud Computing, Information Security, Vulnerabilities, Data Carrier, Cloud-Specific Vulnerabilities, Data Linage, Data Remanence |
Abstract |
An organization can use internet-based services with the help of cloud computing. This mechanism reduces the cost of applications which are required by those organizations as such application will be shared among multiple organizations and they have to pay on pay-as-you-use basis. In today’s world, most of internet users are moving their vital information and data on cloud because of its easy access from any location and from different Platforms. Users need not to worry about processing of data or where physical servers are exist but one thing that can aside all positive things about cloud is information security. Customers are doubtful about security mechanisms implemented by Cloud Service Provider (CSP). They are worried to place their data on a cloud storage area which is shared among various other organizations and users. This paper provides information about current loopholes and vulnerabilities in cloud security at different phases of data and at its carrier, cloud-specific vulnerabilities. |
Other Details |
Paper ID: IJSRDV3I80241 Published in: Volume : 3, Issue : 8 Publication Date: 01/11/2015 Page(s): 724-726 |
Article Preview |
|
|