High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Study of Vulnerabilities in cloud computing

Author(s):

Dnyaneshwar Bhabad , , Shree L.R. Tiwari College of Engineering, Mira rd.; Dnyaneshwar Bhabad, , Shree L.R. Tiwari College of Engineering, Mira rd.; Pratik Sankhe, , Shree L.R. Tiwari College of Engineering, Mira rd.; Vinayak Shinde, , Shree L.R. Tiwari College of Engineering, Mira rd.

Keywords:

Cloud Computing, Information Security, Vulnerabilities, Data Carrier, Cloud-Specific Vulnerabilities, Data Linage, Data Remanence

Abstract

An organization can use internet-based services with the help of cloud computing. This mechanism reduces the cost of applications which are required by those organizations as such application will be shared among multiple organizations and they have to pay on pay-as-you-use basis. In today’s world, most of internet users are moving their vital information and data on cloud because of its easy access from any location and from different Platforms. Users need not to worry about processing of data or where physical servers are exist but one thing that can aside all positive things about cloud is information security. Customers are doubtful about security mechanisms implemented by Cloud Service Provider (CSP). They are worried to place their data on a cloud storage area which is shared among various other organizations and users. This paper provides information about current loopholes and vulnerabilities in cloud security at different phases of data and at its carrier, cloud-specific vulnerabilities.

Other Details

Paper ID: IJSRDV3I80241
Published in: Volume : 3, Issue : 8
Publication Date: 01/11/2015
Page(s): 724-726

Article Preview

Download Article