SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS
Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features p...
Gespeichert in:
Veröffentlicht in: | International journal of advanced research in computer science 2017-11, Vol.8 (9), p.405-410 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 410 |
---|---|
container_issue | 9 |
container_start_page | 405 |
container_title | International journal of advanced research in computer science |
container_volume | 8 |
creator | Oberoi, Priya |
description | Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular). |
doi_str_mv | 10.26483/ijarcs.v8i9.5045 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1980477447</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1980477447</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</originalsourceid><addsrcrecordid>eNpNkNFKwzAUhoMoOOYewLuA151Jc9okV1K7Tou1haYt7Cq0XQsdamfiBN_ebvPC_-b8cD7OgQ-hW0qWrg-C3Q-72rR2-S0GufQIeBdoRiT3Hc-X_PJfv0YLa3dkCpPSBzJDD6rMq2iDszWugjzOSoVVFJZ5XGxwUBRB-KJwnOIwycqVwo-BilY4Sqs4z9LXKC3UDbrq6zfbLf7mHJXrqAifnSR7isMgcVpKBXeACGDU3ULnNtADSI97vBOEyq3H635a9ZzWQsiOk6ZlhDLeEioa4dbAWuBsju7Od_dm_Dx09kvvxoP5mF5qKgUBzuFE0TPVmtFa0_V6b4b32vxoSvRJlT6r0kdV-qiK_QKFWFZy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1980477447</pqid></control><display><type>article</type><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Oberoi, Priya</creator><creatorcontrib>Oberoi, Priya ; M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><description>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</description><identifier>ISSN: 0976-5697</identifier><identifier>EISSN: 0976-5697</identifier><identifier>DOI: 10.26483/ijarcs.v8i9.5045</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Access control ; Cloud computing ; Computer science ; Confidentiality ; Cybersecurity ; Data integrity ; New technology ; Security management ; Threats ; Trends</subject><ispartof>International journal of advanced research in computer science, 2017-11, Vol.8 (9), p.405-410</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Nov 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Oberoi, Priya</creatorcontrib><creatorcontrib>M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><title>International journal of advanced research in computer science</title><description>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</description><subject>Access control</subject><subject>Cloud computing</subject><subject>Computer science</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>New technology</subject><subject>Security management</subject><subject>Threats</subject><subject>Trends</subject><issn>0976-5697</issn><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpNkNFKwzAUhoMoOOYewLuA151Jc9okV1K7Tou1haYt7Cq0XQsdamfiBN_ebvPC_-b8cD7OgQ-hW0qWrg-C3Q-72rR2-S0GufQIeBdoRiT3Hc-X_PJfv0YLa3dkCpPSBzJDD6rMq2iDszWugjzOSoVVFJZ5XGxwUBRB-KJwnOIwycqVwo-BilY4Sqs4z9LXKC3UDbrq6zfbLf7mHJXrqAifnSR7isMgcVpKBXeACGDU3ULnNtADSI97vBOEyq3H635a9ZzWQsiOk6ZlhDLeEioa4dbAWuBsju7Od_dm_Dx09kvvxoP5mF5qKgUBzuFE0TPVmtFa0_V6b4b32vxoSvRJlT6r0kdV-qiK_QKFWFZy</recordid><startdate>20171101</startdate><enddate>20171101</enddate><creator>Oberoi, Priya</creator><general>International Journal of Advanced Research in Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20171101</creationdate><title>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</title><author>Oberoi, Priya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1187-4084312d4e2b4f4495757e8019d57af312f71a889e70bc30137c018b82a43c473</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Cloud computing</topic><topic>Computer science</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>New technology</topic><topic>Security management</topic><topic>Threats</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Oberoi, Priya</creatorcontrib><creatorcontrib>M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Oberoi, Priya</au><aucorp>M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2017-11-01</date><risdate>2017</risdate><volume>8</volume><issue>9</issue><spage>405</spage><epage>410</epage><pages>405-410</pages><issn>0976-5697</issn><eissn>0976-5697</eissn><abstract>Security is top concern for the people of IT from the past. With the advent of new technologies the severity of the problem has been changing its shape. A number of threats and their counter measures had been identified. Similar is the Cloud based environments. In spite of large number of features provided by Clouds, they are not able to attain attention of large number of business community. Cloud Security Alliance (CSA) is the top most working group working on the security issues of the Clouds. In this paper we have studied the various security attacks (in general) with reference to the Clouds (as per The Treacherous 12 - Cloud Computing Top Threats in 2016, CSA report defeating insider threat survey(2016) ,Cyber Security Trends Report (2017)) and Malicious Insider attacks (in particular).</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><doi>10.26483/ijarcs.v8i9.5045</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0976-5697 |
ispartof | International journal of advanced research in computer science, 2017-11, Vol.8 (9), p.405-410 |
issn | 0976-5697 0976-5697 |
language | eng |
recordid | cdi_proquest_journals_1980477447 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Access control Cloud computing Computer science Confidentiality Cybersecurity Data integrity New technology Security management Threats Trends |
title | SURVEY OF VARIOUS SECURITY ATTACKS IN CLOUDS BASED ENVIRONMENTS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T01%3A05%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SURVEY%20OF%20VARIOUS%20SECURITY%20ATTACKS%20IN%20CLOUDS%20BASED%20ENVIRONMENTS&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Oberoi,%20Priya&rft.aucorp=M.M.%20Institute%20of%20Computer%20Technology%20&%20Business%20Management,%20Maharishi%20Markandeshwar%20University,%20Mullana,%20Ambala,%20Haryana,%20India&rft.date=2017-11-01&rft.volume=8&rft.issue=9&rft.spage=405&rft.epage=410&rft.pages=405-410&rft.issn=0976-5697&rft.eissn=0976-5697&rft_id=info:doi/10.26483/ijarcs.v8i9.5045&rft_dat=%3Cproquest_cross%3E1980477447%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1980477447&rft_id=info:pmid/&rfr_iscdi=true |