A Comparative Analysis on Categorization of Different Threats in Cloud Computing Environment  
  Authors : Arati Koli; Dr. Nilesh Uke; Dr. Swati Shinde

 

The cloud is emerging technology now days, but adoption of this technology includes some major concerns like hardware, virtualization, network, abuse of cloud services, challenges with data in storage as well as in transmit. Even the cloud provides many advantages like reduction in cost by providing different scalable and highly flexible services such as Infrastructure as a Service (IaaS), Software as a Service (SaaS), Platform as a Service (PaaS) the cloud consumers always afraid to use cloud services due to the threat barriers. In this paper we survey top threats which are associated with cloud computing and categorized top threats into three categories that is internal threats, external threats and critical threats. This paper helps cloud consumers to analyze which threats are more critical and how they affect the different components of cloud.

 

Published In : IJCAT Journal Volume 3, Issue 11

Date of Publication : November 2016

Pages : 483-486

Figures :--

Tables : 01

Publication Link :A Comparative Analysis on Categorization of Different Threats in Cloud Computing Environment

 

 

 

Arati Koli : has obtained her degree in information technology from Pune University in 2013 with first class with distinction and now pursuing master degree with Honors in information technology. Her current research interests in data mining, cloud computing security and NoSQL databases.

Dr. Nilesh J. Uke : received the BE degree in Computer Science and Engineering from Amravati University, in 1995 , ME in Computer Engineering in 2005 from Bharathi University Pune and Ph.D. in Computer Science and Engineering from SRTM University Nanded, India in 2014. He is currently working as Professor at department of Information Technology, Pimpri Chinchwad College of Engineering, Pune. He is a member of IEEE, ACM, CSI, ISTE.

Dr. Swati Shinde : received her B.E. (CSE) degree from SRTM University, Nanded, M.E.(Computer) degree from Bharti Vidyapeeth Pune and Ph.D. in Computer Science and Engineering from SRTM University Nanded. She is working as a Professor in Pimpri Chichwad College of Engineering. He is a member ISTE.

 

 

 

 

 

 

 

Cloud Services, Virtualization, Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS), Threats

The cloud computing technology gain popularity in recent years. Even though the cloud provides many benefits to cloud consumer such as storage services, Capitalexpenditure free, Flexibility, increased collaboration, Work from anywhere still cloud has some vulnerability and threats which opens security holes to attackers. In this paper, we examined and categorized threats from three perspectives (internal threats, external threats, and critical threats). In the future, we will study the countermeasures to cloud computing threats and vulnerabilities.

 

 

 

 

 

 

 

 

 

[1] SHAVETA DARGAN, ”Security threats in cloud computing environment” ,JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING,2015. [2] Carlo Marcelo Revoredo da Silva, ”Security Threats in Cloud Computing Models: Domains and Proposals” IEEE Sixth International Conference on Cloud Computing 2013. [3] Neha Kajal ,”Security threats in cloud computing”, International Conference on Computing, Communication and Automation (ICCCA2015). [4] Muhammad Kazim, ”A survey on top security threats in cloud computing”(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 3, 2015. [5] Prachi Deshpande*,”Security Threats in Cloud Computing” International Conference on Computing, Communication and Automation (ICCCA2015). [6] Londhe, Ruchita D; Sherekar, Swati S; Thakare, V M. International Journal of Advanced Research in Computer Science5.4 (Apr 2014). [7] Zhaolong Gou , Shingo Yamaguchi and B. B. Gupta,"Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey", Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, 2016.