The cloud is emerging technology now days, but
adoption of this technology includes some major concerns
like hardware, virtualization, network, abuse of cloud
services, challenges with data in storage as well as in
transmit. Even the cloud provides many advantages like
reduction in cost by providing different scalable and highly
flexible services such as Infrastructure as a Service (IaaS),
Software as a Service (SaaS), Platform as a Service (PaaS)
the cloud consumers always afraid to use cloud services due
to the threat barriers. In this paper we survey top threats
which are associated with cloud computing and categorized
top threats into three categories that is internal threats,
external threats and critical threats. This paper helps cloud
consumers to analyze which threats are more critical and
how they affect the different components of cloud.
Arati Koli : has obtained her degree in information technology from
Pune University in 2013 with first class with distinction and now
pursuing master degree with Honors in information technology.
Her current research interests in data mining, cloud computing
security and NoSQL databases.
Dr. Nilesh J. Uke : received the BE degree in Computer
Science and Engineering from Amravati University, in 1995 , ME
in Computer Engineering in 2005 from Bharathi University Pune
and Ph.D. in Computer Science and Engineering from SRTM
University Nanded, India in 2014. He is currently working as
Professor at department of Information Technology, Pimpri
Chinchwad College of Engineering, Pune. He is a member of
IEEE, ACM, CSI, ISTE.
Dr. Swati Shinde : received her B.E. (CSE) degree from SRTM
University, Nanded, M.E.(Computer) degree from Bharti
Vidyapeeth Pune and Ph.D. in Computer Science and Engineering
from SRTM University Nanded. She is working as a Professor in
Pimpri Chichwad College of Engineering. He is a member ISTE.
Cloud Services, Virtualization, Infrastructure as
a Service (IaaS), Software as a Service (SaaS), and Platform
as a Service (PaaS), Threats
The cloud computing technology gain popularity in recent
years. Even though the cloud provides many benefits to
cloud consumer such as storage services, Capitalexpenditure
free, Flexibility, increased collaboration,
Work from anywhere still cloud has some vulnerability
and threats which opens security holes to attackers. In this
paper, we examined and categorized threats from three
perspectives (internal threats, external threats, and critical
threats). In the future, we will study the countermeasures
to cloud computing threats and vulnerabilities.
[1] SHAVETA DARGAN, ”Security threats in cloud
computing environment” ,JOURNAL OF
INFORMATION, KNOWLEDGE AND RESEARCH
IN COMPUTER ENGINEERING,2015.
[2] Carlo Marcelo Revoredo da Silva, ”Security Threats in
Cloud Computing Models: Domains and Proposals”
IEEE Sixth International Conference on Cloud
Computing 2013.
[3] Neha Kajal ,”Security threats in cloud computing”,
International Conference on Computing,
Communication and Automation (ICCCA2015).
[4] Muhammad Kazim, ”A survey on top security threats
in cloud computing”(IJACSA) International Journal of
Advanced Computer Science and Applications, Vol. 6,
No. 3, 2015.
[5] Prachi Deshpande*,”Security Threats in Cloud
Computing” International Conference on Computing,
Communication and Automation (ICCCA2015).
[6] Londhe, Ruchita D; Sherekar, Swati S; Thakare, V M.
International Journal of Advanced Research in
Computer Science5.4 (Apr 2014).
[7] Zhaolong Gou , Shingo Yamaguchi and B. B.
Gupta,"Analysis of Various Security Issues and
Challenges in Cloud Computing Environment: A
Survey", Handbook of Research on Modern
Cryptographic Solutions for Computer and Cyber
Security, 2016.